DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, JS | - |
dc.contributor.author | Cho, K | - |
dc.contributor.author | Yum, DH | - |
dc.contributor.author | Hong, SJ | - |
dc.contributor.author | Lee, PJ | - |
dc.date.accessioned | 2016-03-31T08:36:44Z | - |
dc.date.available | 2016-03-31T08:36:44Z | - |
dc.date.created | 2013-03-29 | - |
dc.date.issued | 2012-04 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.other | 2012-OAK-0000027323 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/15654 | - |
dc.description.abstract | Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.title | Lightweight Distance Bounding Protocol against Relay Attacks | - |
dc.type | Article | - |
dc.contributor.college | 창의IT융합공학과 | - |
dc.identifier.doi | 10.1587/TRANSINF.E95.D.1155 | - |
dc.author.google | Kim, JS | - |
dc.author.google | Cho, K | - |
dc.author.google | Yum, DH | - |
dc.author.google | Hong, SJ | - |
dc.author.google | Lee, PJ | - |
dc.relation.volume | E95D | - |
dc.relation.issue | 4 | - |
dc.relation.startpage | 1155 | - |
dc.relation.lastpage | 1158 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E95D, no.4, pp.1155 - 1158 | - |
dc.identifier.wosid | 000302834400026 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 1158 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 1155 | - |
dc.citation.title | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.volume | E95D | - |
dc.contributor.affiliatedAuthor | Hong, SJ | - |
dc.contributor.affiliatedAuthor | Lee, PJ | - |
dc.identifier.scopusid | 2-s2.0-84859369602 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 5 | - |
dc.description.scptc | 5 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | relay attack | - |
dc.subject.keywordAuthor | mafia fraud attack | - |
dc.subject.keywordAuthor | distance bounding protocol | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.