Filtros de búsqueda

Lista de obras de Aikaterini Mitrokotsa

A Note on a Privacy-Preserving Distance-Bounding Protocol

A comprehensive RFID solution to enhance inpatient medication safety

artículo científico publicado en 2010

Classifying RFID attacks and defenses

DDoS attacks and defense mechanisms: classification and state-of-the-art

article published in 2004

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Evaluation of classification algorithms for intrusion detection in MANETs

Expected loss bounds for authentication in constrained channels

scholarly article published March 2012

Guest Editors' Introduction: Special Section on Learning, Games, and Security

Integrated RFID and Sensor Networks

Intrusion Detection Using Emergent Self-organizing Maps

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

scholarly article published in International Federation for Information Processing

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Location leakage in distance bounding: Why location privacy does not work

artículo científico publicado en 2014

Mafia fraud attack against the RČ Distance-Bounding Protocol

Near-optimal blacklisting

artículo científico publicado en 2017

Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication

artículo científico publicado en 2024

On Selecting the Nonce Length in Distance-Bounding Protocols

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols

On the traceability of tags in SUAP RFID authentication protocols

RFID technology, systems, and applications

article published in 2011

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Secure and Lightweight Distance-Bounding

Statistical Decision Making for Authentication and Intrusion Detection

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks

Threats to Networked RFID Systems

User-driven RFID applications and challenges

Weaknesses in another Gen2-based RFID authentication protocol