Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorShafarenko, Alex
dc.contributor.authorStajano, Frank
dc.contributor.authorWong, Ford-Long
dc.date.accessioned2015-02-05T09:18:03Z
dc.date.available2015-02-05T09:18:03Z
dc.date.issued2014
dc.identifier.citationChristianson , B , Shafarenko , A , Stajano , F & Wong , F-L 2014 , Relay-proof channels using UWB lasers . in Security Protocols XVIII . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 7061 , Springer Nature , pp. 45-46 , 18th International Workshop Security Protocols , Cambridge , United Kingdom , 24/03/10 . https://doi.org/10.1007/978-3-662-45921-8_8
dc.identifier.citationconference
dc.identifier.isbn9783662459201
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/2299/15345
dc.description.abstractAlice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented?en
dc.format.extent2
dc.format.extent78694
dc.language.isoeng
dc.publisherSpringer Nature
dc.relation.ispartofSecurity Protocols XVIII
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.subjectComputer Science(all)
dc.subjectTheoretical Computer Science
dc.titleRelay-proof channels using UWB lasersen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
rioxxterms.versionofrecord10.1007/978-3-662-45921-8_8
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record