Issue No.03 - July-September (2012 vol.11)
B. Preneel , Katholieke Univ. Leuven, Leuven, Belgium
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MPRV.2011.42
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private key among various personal devices improves system security and reliability.
reliability, authorisation, cryptographic protocols, mobile computing, public key cryptography, system reliability improvement, access control, remote user authentication, security token, relay attack failures, relay attack vulnerability, threshold-based distance-bounding protocol, user private key distribution, personal devices, system security improvement, Protocols, Logic gates, Access control, Public key, Remote monitoring, RFID, access control, threshold cryptography, distance bounding protocols
B. Preneel, "Toward More Secure and Reliable Access Control", IEEE Pervasive Computing, vol.11, no. 3, pp. 76-83, July-September 2012, doi:10.1109/MPRV.2011.42