A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Secure object identification
2003
Proceedings of the 2003 workshop on New security paradigms - NSPW '03
Many applications of cryptographic identification protocols are vulnerable against physical adversaries who perform real time attacks. For instance, when identifying a physical object like an automated teller machine, common identification schemes can be bypassed by faithfully relaying all messages between the communicating participants. This attack is known as mafia fraud. The Probabilistic Channel Hopping (PCH) system we introduce in this paper, solves this problem by hiding the conversation
doi:10.1145/986655.986668
dblp:conf/nspw/AlkassarSS03
fatcat:duecj5ogyfd2rgv47tpribili4