11 research outputs found

    In-depth energy analysis of security algorithms and protocols for the Internet of Things

    Get PDF
    Computer Science

    Hierarchical ECC-Based RFID Authentication Protocol

    No full text
    Contains fulltext : 91888.pdf (author's version ) (Closed access

    The communication and computation cost of wireless security: extended abstract

    No full text
    Contains fulltext : 92444.pdf (publisher's version ) (Closed access)4th ACM Conference on Wireless Network Security, WiSec'11; Hamburg; 15 June 2011 through 17 June 201

    Low-cost untraceable authentication protocols for RFID

    No full text
    Contains fulltext : 83551.pdf (publisher's version ) (Closed access)WiSec'10, 22 maart 201

    Wide-Weak Privacy-Preserving RFID Authentication Protocols

    No full text
    Contains fulltext : 83640.pdf (preprint version ) (Closed access

    Security of Distance-Bounding: A Survey

    No full text
    Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features

    Security of Distance-Bounding: A Survey

    No full text
    Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features
    corecore