Filters








11 Hits in 9.1 sec

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a complex task.  ...  Based on this, we present a generic construction for provably secure distance-bounding protocols, and give three instances: (1) an efficient symmetric-key protocol, (2) a public-key protocol protecting  ...  The second is TREAD (for Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding), which is a generic construction implementing the proposed approach.  ... 
doi:10.1145/3052973.3053000 dblp:conf/ccs/AvoineBGG0OR17 fatcat:itgunnhgurevdd7oldniin27ha

Distance-bounding Identification

Ahmad Ahmadi, Reihaneh Safavi-Naini
2017 Proceedings of the 3rd International Conference on Information Systems Security and Privacy  
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound.  ...  We propose a new approach to formalizing the security of DB protocols that we call distance-bounding identification (DBID), and is inspired by the security definition of cryptographic identification protocols  ...  The model captures Distance-Fraud, Distance-Hijacking, Mafia-Fraud, Impersonation and Terrorist-Fraud.  ... 
doi:10.5220/0006211102020212 dblp:conf/icissp/AhmadiS17 fatcat:ue7typcy4rdpno4tnwtn5i2lba

Distance-Bounding Protocols: Verification Without Time and Location

Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the location of agents.  ...  Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants.  ...  ACKNOWLEDGMENT This work was supported by the Luxembourg National Research Fund under the grants AFR-PhD-10188265 and C15-IS-10428112.  ... 
doi:10.1109/sp.2018.00001 dblp:conf/sp/MauwSTT18 fatcat:yb27nrpmpjgejosg47yedmp46a

Implications of Position in Cryptography

Handan Kilinç Alper
2018
A distance bounding protocol is a two-party authentication protocol between a prover and a verifier which considers the distance of the prover as a part of his/her credential.  ...  In this direction, we first study the optimal security bounds that a distance bounding protocol can achieve.  ...  Now, we give our security definition for a DB protocol in SHM. The definition covers distance fraud, mafia fraud (MiM), distance hijacking and terrorist fraud which are the threat models in PM.  ... 
doi:10.5075/epfl-thesis-8981 fatcat:syvv5nec55aohcxha4le2jii2u

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
Essays about corruption, money laundering, crime, and international finance.  ...  "anonymous cog in the machine".  ...  The Macedonians are likely to resist. The West will intervene. Macedonia is facing a hot spring and a sizzling summer.  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

International Journal of Computer Science July 2021

IJCSIS Editor
2021 Zenodo  
See authors guide for manuscript preparation and submission guidelines.  ...  , state of the art, research, standards, implementations, running experiments, applications, and industrial case studies.  ...  Some of the assault types affecting financial organizations include fraud, theft of bank accounts, money washing, breaches of personal data, and terrorist funding.  ... 
doi:10.5281/zenodo.5543977 fatcat:vxk2ynl3l5bbpcvpda2lt4qef4

LEADERLESS RESISTANCE, RADICAL ENVIRONMENTALISM, AND ASYMMETRICAL WARFARE

James Paul Joosse
2014
I argue over the course of a series of papers that leaderless resistance is both more than this and sometimes not this.  ...  Chapter three tests a link in the communicative cycle through which leaderless resistance purports to operate, namely the interaction between above-ground spokespersons and the potential saboteurs that  ...  seconds of free space after saying -You're a violent eco-terrorist. Defend yourself ‖ (Guerilla News Network, 2002: 224).  ... 
doi:10.7939/r3m03z43d fatcat:qpmrbqchuvccjbjdum6s5pihiu

The Globalization of Jurisdiction

Paul Schiff Berman
2002 University of Pennsylvania law review  
Oct. 1, 2002) (ruling that Internet users could not be bound by a license agreement mandating arbitration when the provision was buried on the second page of a free software download program); Comb v.  ...  social constructions of space, distance, and community.  ...  For example, the Internet for many years was largely an American creation, and its architecture (both technical and legal) tended to embed American values such as free speech within it. Yahoo!  ... 
doi:10.2307/3312952 fatcat:a44unk2a5bhx3i4lvt72qdvgbi

The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

Mike Johnstone, Mike Johnstone
2016
Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers.  ...  The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference.  ...  Acknowledgements We would like to thank the Institute for Radio Astronomy and Space Research at Auckland University of Technology, for the use of the 30m Warkworth Radio Telescope for the collection of  ... 
doi:10.4225/75/58a69ee5afc30 fatcat:jignq7gk4nab3btnazrfz2nany

Biometrics & [and] Security:Combining Fingerprints, Smart Cards and Cryptography

Claude Barral
2010
These operations are mandatory to compute both a spacial distance and a direction distance between a reference minutia and a candidate minutia when mapping a candidate template onto a reference template  ...  Internet Login and On-Line Access As is the case with passwords and other biometric protocols, one cannot require resistance against parties who witnessed a successful biometric identification session  ...  too close to other existing minutia upon bound on spatial distance and pick θ at random with bounds determined upon angle data of surrounding minutiae for local coherence. 4.  ... 
doi:10.5075/epfl-thesis-4748 fatcat:jhoo5maeebcnjm5yf4nypv4y74

The Globalization of Jurisdiction: Cyberspace, Nation-States, and Community Definition

Paul Schiff Berman
2002 Social Science Research Network  
Oct. 1, 2002) (ruling that Internet users could not be bound by a license agreement mandating arbitration when the provision was buried on the second page of a free software download program); Comb v.  ...  social constructions of space, distance, and community.  ...  For example, the Internet for many years was largely an American creation, and its architecture (both technical and legal) tended to embed American values such as free speech within it. Yahoo!  ... 
doi:10.2139/ssrn.304621 fatcat:sajwcesd7vc47oagt7k7n3meai