scispace - formally typeset
Open AccessProceedings Article

Distance-Bounding Protocols (Extended Abstract).

Stefan A. Brands, +1 more
- pp 344-359
About
This article is published in Theory and Application of Cryptographic Techniques.The article was published on 1993-01-01 and is currently open access. It has received 525 citations till now. The article focuses on the topics: Distance-bounding protocol & Bounding overwatch.

read more

Citations
More filters
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Journal ArticleDOI

The security and privacy of smart vehicles

TL;DR: Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology, but this evolution has deep implications for security and privacy, which the research community has overlooked so far.
Proceedings ArticleDOI

Rushing attacks and defense in wireless ad hoc network routing protocols

TL;DR: The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols.
Proceedings ArticleDOI

Secure verification of location claims

TL;DR: The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.
Proceedings ArticleDOI

Detecting and correcting malicious data in VANETs

TL;DR: A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
References
More filters
Book ChapterDOI

How to prove yourself: practical solutions to identification and signature problems

TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Book ChapterDOI

Wallet Databases with Observers

TL;DR: This article argues that a particular combination of these two kinds of mechanism can overcome the limitations of each alone, providing both security and correctness for organizations as well as privacy and even anonymity for individuals.
Journal ArticleDOI

Minimum disclosure proofs of knowledge

TL;DR: In this article, the authors present protocols for allowing a "prover" to convince a "verifier" that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the secret.
Book ChapterDOI

The Prisoners’ Problem and the Subliminal Channel

TL;DR: Two accomplices in a crime have been arrested and are about to be locked in widely separated cells and their only means of communication after they are locked up will he by way of messages conveyed for them by trustees -- who are known to be agents of the warden.
Book ChapterDOI

Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes

TL;DR: A variant is proposed which is proven to be as secuie as the difficulty of solving both the discrete logarithm problem and the specific factoring problem simultaneously simultaneously and some other variants such as an identity-based variant and an elliptic curve variant are also proposed.