From post

Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.

, , , и . ESORICS (3), том 14346 из Lecture Notes in Computer Science, стр. 100-119. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How secret-sharing can defeat terrorist fraud., , и . WISEC, стр. 145-156. ACM, (2011)Reducing Time Complexity in RFID Systems., , и . Selected Areas in Cryptography, том 3897 из Lecture Notes in Computer Science, стр. 291-306. Springer, (2005)RFID Distance Bounding Multistate Enhancement., , и . INDOCRYPT, том 5922 из Lecture Notes in Computer Science, стр. 290-307. Springer, (2009)RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks., и . CANS, том 5888 из Lecture Notes in Computer Science, стр. 119-133. Springer, (2009)ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol., , , и . Cryptogr., 6 (4): 52 (2022)Unique in the Smart Grid -The Privacy Cost of Fine-Grained Electrical Consumption Data., , , , , и . CoRR, (2022)How Distance-Bounding Can Detect Internet Traffic Hijacking., , , и . CANS, том 13099 из Lecture Notes in Computer Science, стр. 355-371. Springer, (2021)Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks., , , и . ESORICS (3), том 14346 из Lecture Notes in Computer Science, стр. 100-119. Springer, (2023)An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement., и . ISC, том 5735 из Lecture Notes in Computer Science, стр. 250-261. Springer, (2009)The Poulidor Distance-Bounding Protocol., , и . RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 239-257. Springer, (2010)