{ "labelLang" : "hun", "responseDate" : "2024-03-29 14:02", "content" : { "otype" : "BookChapter", "mtid" : 26960518, "status" : "APPROVED", "published" : true, "comment" : "A4 ACM SIGSAC", "unhandledTickets" : 0, "oldTimestamp" : "2017-11-13T20:45:44.000+0000", "deleted" : false, "oldId" : 16960518, "lastRefresh" : "2024-02-20T10:38:15.989+0000", "lastModified" : "2017-11-13T20:45:44.000+0000", "created" : "2017-11-13T20:12:53.000+0000", "creator" : { "otype" : "Admin", "mtid" : 10015168, "link" : "/api/admin/10015168", "label" : "Szakonyi Erzsebet (RAMKI admin 4)", "familyName" : "Szakonyi", "givenName" : "Erzsebet", "published" : true, "oldId" : 10015168, "snippet" : true }, "lastDuplumSearch" : "2024-02-20T10:14:43.795+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Avoine, G", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 73405840, "link" : "/api/authorship/73405840", "label" : "Avoine, G", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Avoine", "givenName" : "G", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 149246050, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 73405841, "link" : "/api/authorship/73405841", "label" : "Lauradoux, C", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : false, "familyName" : "Lauradoux", "givenName" : "C", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 149246049, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 73405842, "link" : "/api/authorship/73405842", "label" : "Martin, B", "listPosition" : 3, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Martin", "givenName" : "B", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 149246048, "snippet" : true } ], "title" : "How secret-sharing can defeat terrorist fraud", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 13210854, "link" : "/api/publicationidentifier/13210854", "label" : "DOI: 10.1145/1998412.1998437", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "10.1145/1998412.1998437", "realUrl" : "https://doi.org/10.1145/1998412.1998437", "published" : false, "oldId" : 15995190, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 13210853, "link" : "/api/publicationidentifier/13210853", "label" : "Scopus: 80051887821", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "80051887821", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-80051887821", "published" : false, "oldId" : 15995189, "snippet" : true } ], "firstPage" : "145", "lastPage" : "155", "firstPageOrInternalIdForSort" : "145", "pageLength" : 11, "publishedYear" : 2011, "digital" : null, "printed" : null, "sourceYear" : 2017, "packet" : "650214", "foreignEdition" : null, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : null, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2024-02-20", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "referenceList" : "Avoine, G., Bingöl, M.A., Kardaş, S., Lauradoux, C., Martin, B., A framework for analyzing RFID distance bounding protocols (2010) Journal of Computer Security - Special Issue on RFID System Security; \n\nAvoine, G., Dysli, E., Oechslin, P., Reducing time complexity in RFID systems (2005) Selected Areas in Cryptography - SAC 2005, Volume 3897 of Lecture Notes in Computer Science, pp. 291-306. , Kingston, Canada, August Springer-Verlag; \n\nAvoine, G., Floerkemeier, C., Martin, B., RFID distance bounding multistate enhancement (2009) International Conference on Cryptology in India-indocrypt 2009, Volume 5922 of Lecture Notes in Computer Science, pp. 290-307. , Springer-Verlag; \n\nBengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-J., Secure implementation of identification systems (1991) Journal of Cryptology, 4 (3), pp. 175-183; \n\nBeth, T., Desmedt, Y., Identification tokens - Or: Solving the chess grandmaster problem (1990) Advances in Cryptology - CRYPTO '90, Volume 537 of Lecture Notes in Computer Science, pp. 169-177. , Santa Barbara, CA, USA, August Springer-Verlag; \n\nBlakley, G.R., Safeguarding cryptographic keys AFIPS 1979 National Computer Conference, 48, pp. 313-317. , Arlington, NY, USA, 1979-317; \n\nBlaze, M., Looking on the bright side of black-box cryptography (2001) Lecture Notes in Computer Science, (2133), pp. 54-61. , Security Protocols; \n\nBrands, S., Chaum, D., Distance-bounding protocols (1993) Advances in Cryptology-EUROCRYPT'93, Volume 765 of Lecture Notes in Computer Science, pp. 344-359. , Lofthus, Norway, May Springer-Verlag; \n\nBrickell, E.F., Davenport, D.M., On the classification of ideal secret sharing schemes (1991) Journal of Cryptology, 4, pp. 123-134; \n\nBussard, L., (2004) Trust Establishement Protocols for Communications Devices, , PhD thesis, Eurecom-ENST; \n\nBussard, L., Bagga, W., Distance-bounding proof of knowledge to avoid real-time attacks (2005) Security and Privacy in the Age of Ubiquitous Computing, Volume 181 of IFIP International Federation for Information Processing, pp. 223-238. , Springer-Verlag; \n\nCsirmaz, L., The size of a share must be large (1994) Advances in Cryptology - EUROCRYPT '94, Volume 950 of Lecture Notes in Computer Science, pp. 13-22. , Perugia, Italy Springer-Verlag; \n\nDesmedt, Y., Goutier, C., Bengio, S., Special uses and abuses of the fiat-shamir passport protocol (1988) Advances in Cryptology - CRYPTO'87, Volume 293 of Lecture Notes in Computer Science, pp. 21-39. , Santa Barbara, CA, USA, August Springer-Verlag; \n\nDrimer, S., Murdoch, S.J., Keep your enemies close: Distance bounding against smartcard relay attacks (2007) 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1-16. , Santa Clara, CA, USA, June USENIX Association; \n\nFlury, M., Poturalski, M., Papadimitratos, P., Hubaux, J.-P., Boudec, J.-Y.L., Effectiveness of distance-decreasing attacks against impulse radio ranging (2010) ACM Conference on Wireless Network Security - WISEC 2010, pp. 117-128. , Hoboken, NJ, USA ACM; \n\nHancke, G.P., Design of a secure distance-bounding channel for RFID (2010) Journal of Network and Computer Applications, , May; \n\nHancke, G.P., Kuhn, M., An RFID distance bounding protocol (2005) Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, pp. 67-73. , Athens, Greece, September IEEE Computer Society; \n\nHancke, G.P., Kuhn, M.G., Attacks on time-of-flight distance bounding channels (2008) ACM Conference on Wireless Network Security - WISEC 2008, pp. 194-202. , Alexandria, VA, USA, March ACM; \n\nISO/IEC 9798 - Information Technology - Security Techniques - Entity Authentication, pp. 1997-2008. , International Organization for Standardization; \n\nJoux, A., Multicollisions in iterated hash functions. Application to cascaded constructions (2004) Advances in Cryptology - CRYPTO 2004, Volume 3152 of Lecture Notes in Computer Science, pp. 306-316. , Santa Barbara, CA, USA, August Springer-Verlag; \n\nKim, C.H., Avoine, G., RFID distance bounding protocol with mixed challenges to prevent relay attacks (2009) International Conference on Cryptology and Network Security - CANS, Volume 5888 of Lecture Notes in Computer Science, pp. 119-133. , Kanazawa, Ishikawa, Japan, December Springer-Verlag; \n\nKim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O., The swiss-knife RFID distance bounding protocol (2008) International Conference on Information Security and Cryptology - ICISC'08, Volume 5461 of Lecture Notes in Computer Science, pp. 98-115. , Seoul, Korea, December Springer-Verlag; \n\nKuhn, M., Luecken, H., Tippenhauer, N.O., UWB impulse radio based distance bounding (2010) Workshop on Positioning, Navigation and Communication 2010 - WPNC'10, , Dresden, Germany, March; \n\nMassey, J.L., Minimal codewords and secret sharing (1993) Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, pp. 276-279; \n\nMceliece, R.J., Sarwate, D.V., On sharing secrets and reed-solomon codes (1981) Communication of the ACM, 24 (9), pp. 583-584; \n\nMitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P., Hernandez-Castro, R.J.C., Distance bounding protocol and mafia fraud attacks over noisy channels (2010) IEEE Communications Letters, 14 (2), pp. 121-123. , July; \n\nMunilla, J., Peinado, A., Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels (2008) Wireless Communications and Mobile Computing, 8 (9), pp. 1227-1232; \n\nPaar, C., (1994) Efficient VLSI Architectures for Bit Parallel Computation in Galois Fields, , PhD thesis, Universität GH Essen; \n\nRasmussen, K.B., Čapkun, S., Realization of RF distance bounding (2010) USENIX Security Symposium, , Washington, DC, USA, August; \n\nReid, J., Nieto, J.M.G., Tang, T., Senadji, B., Detecting relay attacks with timing-based protocols (2007) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, pp. 204-213. , DOI 10.1145/1229285.1229314, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07; \n\nSaxena, A., Wyseur, B., Preneel, B., Towards security notions for white-box cryptography (2009) Information Security Conference-ISC 2009, Volume 5735 of Lecture Notes in Computer Science, pp. 49-58. , Pisa, Italy, September Springer-Verlag; \n\nShamir, A., How to share a secret (1979) Communication of the ACM, 22 (11), pp. 612-613; \n\nSimmons, G.J., (1991) Contemporary Cryptology: The Science of Information Integrity, , IEEE Press; \n\nSingelée, D., Preneel, B., Distance bounding in noisy environments (2007) European Workshop on Security in Ad-hoc and Sensor Networks - ESAS'07, Volume 4572 of Lecture Notes in Computer Science, pp. 101-115. , Cambridge, UK, July Springer-Verlag; \n\nSuzuki, K., Tonien, D., Kurosawa, K., Toyota, K., Birthday paradox for multi-collisions (2006) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4296, pp. 29-40. , Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings; \n\nTrujillo Rasua, R., Martin, B., Avoine, G., The poulidor distance-bounding protocol (2010) Workshop on RFID Security - RFIDSec'10, Volume 6370 of Lecture Notes in Computer Science, pp. 239-257. , S. O. Yalcin, editor Istanbul, Turkey, June Springer-Verlag; \n\nTu, Y.-J., Piramuthu, S., RFID distance bounding protocols (2007) First International EURASIP Workshop on RFID Technology, , Vienna, Austria, September; \n\nWagner, D., A generalized birthday problem (2002) Advances in Cryptology - CRYPTO 2002, Volume 2442 of Lecture Notes in Computer Science, pp. 288-303. , Santa Barbara, CA, USA, August Springer-Verlag", "hasCitationDuplums" : false, "userChangeableUntil" : "2018-02-11T20:13:01.000+0000", "publishDate" : "2017-11-13T20:13:01.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 1, "ownerInstituteCount" : 10, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 30275823, "link" : "/api/publication/30275823", "label" : "4th ACM Conference on Wireless Network Security, WiSec'11. (2011) ISBN:9781450306928", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "4th ACM Conference on Wireless Network Security, WiSec'11", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 13210852, "link" : "/api/publicationidentifier/13210852", "label" : "ISBN: 9781450306928", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781450306928", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781450306928", "published" : false, "snippet" : true } ], "publishedAt" : [ ], "publishedYear" : 2011, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : true, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/26960518", "label" : "Avoine G et al. How secret-sharing can defeat terrorist fraud. (2011) Megjelent: 4th ACM Conference on Wireless Network Security, WiSec'11 pp. 145-155", "template" : "