Open Access System for Information Sharing

Login Library

 

Article
Cited 5 time in webofscience Cited 5 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorKim, JS-
dc.contributor.authorCho, K-
dc.contributor.authorYum, DH-
dc.contributor.authorHong, SJ-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-03-31T08:36:44Z-
dc.date.available2016-03-31T08:36:44Z-
dc.date.created2013-03-29-
dc.date.issued2012-04-
dc.identifier.issn0916-8532-
dc.identifier.other2012-OAK-0000027323-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/15654-
dc.description.abstractTraditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.titleLightweight Distance Bounding Protocol against Relay Attacks-
dc.typeArticle-
dc.contributor.college창의IT융합공학과-
dc.identifier.doi10.1587/TRANSINF.E95.D.1155-
dc.author.googleKim, JS-
dc.author.googleCho, K-
dc.author.googleYum, DH-
dc.author.googleHong, SJ-
dc.author.googleLee, PJ-
dc.relation.volumeE95D-
dc.relation.issue4-
dc.relation.startpage1155-
dc.relation.lastpage1158-
dc.contributor.id10051689-
dc.relation.journalIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E95D, no.4, pp.1155 - 1158-
dc.identifier.wosid000302834400026-
dc.date.tcdate2019-01-01-
dc.citation.endPage1158-
dc.citation.number4-
dc.citation.startPage1155-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE95D-
dc.contributor.affiliatedAuthorHong, SJ-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-84859369602-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc5-
dc.description.scptc5*
dc.date.scptcdate2018-05-121*
dc.type.docTypeArticle-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorrelay attack-
dc.subject.keywordAuthormafia fraud attack-
dc.subject.keywordAuthordistance bounding protocol-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

홍성제HONG, SUNG JE
Div of IT Convergence Enginrg
Read more

Views & Downloads

Browse