Search For:

Displaying 1-2 out of 2 total
Location verification using secure distance bounding protocols
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By D. Singelee, B. Preneel
Issue Date:November 2005
pp. 840
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be u...
Toward More Secure and Reliable Access Control
Found in: IEEE Pervasive Computing
By R. Peeters,D. Singelee,B. Preneel
Issue Date:March 2012
pp. 76-83
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private...