dc.contributor.author | Christianson, B. | |
dc.contributor.author | Shafarenko, Alex | |
dc.contributor.author | Stajano, Frank | |
dc.contributor.author | Wong, Ford-Long | |
dc.date.accessioned | 2015-02-05T09:18:03Z | |
dc.date.available | 2015-02-05T09:18:03Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | Christianson , B , Shafarenko , A , Stajano , F & Wong , F-L 2014 , Relay-proof channels using UWB lasers . in Security Protocols XVIII . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 7061 , Springer Nature , pp. 45-46 , 18th International Workshop Security Protocols , Cambridge , United Kingdom , 24/03/10 . https://doi.org/10.1007/978-3-662-45921-8_8 | |
dc.identifier.citation | conference | |
dc.identifier.isbn | 9783662459201 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/2299/15345 | |
dc.description.abstract | Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share a key, which Alice uses to request a service from Bob (dispense cash, open door, don't shoot). Mort pretends to Bob that she is Alice, and her accomplice Cove pretends to Alice that he is Bob. Mort and Cove relay the appropriate challenges and responses to one another over a channel hidden from Alice and Bob. Meanwhile Alice waits impatiently in front of a different ATM, or the wrong door, or another gun. How can such an attack be prevented? | en |
dc.format.extent | 2 | |
dc.format.extent | 78694 | |
dc.language.iso | eng | |
dc.publisher | Springer Nature | |
dc.relation.ispartof | Security Protocols XVIII | |
dc.relation.ispartofseries | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.subject | Computer Science(all) | |
dc.subject | Theoretical Computer Science | |
dc.title | Relay-proof channels using UWB lasers | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Science & Technology Research Institute | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
rioxxterms.versionofrecord | 10.1007/978-3-662-45921-8_8 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |