Toward More Secure and Reliable Access Control
IEEE Pervasive Computing
By R. Peeters,D. Singelee,B. Preneel
Issue Date:March 2012
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private...