1 |
D. Jackson, "A Micromodels of Software: Lightweight Modelling and Analysis with Alloy," Software Design Group, MIT Lab Manual, Cambridge, USA: MIT, Feb. 2002, pp. 1-58.
|
2 |
D. Jackson, "Alloy: A Lightweight Object Modelling Notation," ACM Trans. Softw. Eng. Methodology, vol. 11, no. 2, pp. 256-290.
|
3 |
R.J. McEliece, "A Public Key Cryptosystem Based on Algebraic Coding Theory," Jet Propulsion Lab., CA, USA, Deep Space Network Progress, Report 42-44, Feb. 1978, pp. 114-116.
|
4 |
T. Eisenbarth et al., "MicroEliece: McEliece for Embedded Devices," Proc. Cryptographic Hardware Embedded Syst., Lausanne, Switzerland, Sept. 6-9, 2009, pp. 49-64.
|
5 |
T.P. Berger et al., "Reducing Key Length of the McEliece Cryptosystem," Progress Cryptology-AFRICACRYPT, Gammarth, Tunisia, June 21-25, 2009, pp. 77-97.
|
6 |
L. Minder and A. Shokrollahi, "Cryptanaysis of the Sidelnikov Cryptosystem," EUROCRYPT, Barcelona, Spain, May 20-24, 2007, pp. 347-360.
|
7 |
C. Faure and L. Minder, "Cryptanalysis of the McElice Cryptosystem over Hyper Elliptic Codes," Int. Workshop Algebraic Combinatorial Coding Theory, Pamporovo, Bulgaria, June 16-22, 2008, pp. 99-107.
|
8 |
J.K. Gibson, "The Security of the Gabidulin Public Key Cryptosystem," Adv. Cryptology, EUROCRYPT, Saragossa, Spain, May 12-16, 1996, pp. 212-223.
|
9 |
R. Overbeck, "Structural Attacks for Public Key Cryptosystems Based on Gabidulin Codes," J. Cryptology, vol. 21, no. 2, Apr. 2008, pp. 280-301.
DOI
|
10 |
V.M. Sidelnikov and S.O. Shestakov, "On Insecurity of Cryptosystems Based on Generalized Reed-Solomon Codes," Discrete Math. Appl., vol. 2, no. 4, Jan. 1992, pp. 439-444.
|
11 |
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," ACM Workshop Wireless Security, San Diego, CA, USA, Sept. 28, 2003, pp. 1-10.
|
12 |
S. Capkun, M. Cagalj, and M. Srivastava, "Secure Localization with Hidden and Mobile Base Stations," IEEE INFOCOM, Barcelona, Spain, Apr. 23-29, 2006, pp. 1-10.
|
13 |
M. Talasila, R. Curtmola, and C. Borcea, "LINK: Location Verification through Immediate Neighbors Knowledge," Int. Conf. Mobile Ubiquitous Syst.: Comput. Netw. Serv., Sydney, Australia, Dec. 6-9, 2010, pp. 210-223.
|
14 |
Y. Wei, Z. Yu, and Y. Guan, "Location Verification Algorithms for Wireless Sensor Networks," IEEE Int. Conf. Distrib. Comput. Syst., Toronto, Canada, June 25-27, 2007, pp. 938-950.
|
15 |
D. Molnar, A. Soppera, and D. Wagner, "A Scalable Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," Sel. Areas Cryptography, Kingston, Canada, Aug. 11-12, 2005, pp. 276-290.
|
16 |
Y. Tian, G. Chen, and J. Li, "A New Ultra lightweight RFID Authentication Protocol with Permutation," IEEE Commun. Lett., vol. 16, no. 5, May 2012, pp. 702-705.
DOI
|
17 |
U. Mujahid et al., "Cryptanalysis of Ultra lightweight RFID Authentication Protocol," IACR Cryptology ePrint Archive, Report 2013/385, 2013.
|
18 |
A. Juels, "Yoking-Proofs for RFID Tags," IEEE Conf. Pervasive Comput. Commun., Orlando, FL, USA, 2004, pp. 138-143.
|
19 |
L. Lamport, "Constructing Digital Signatures from a One Way Function," SRI Int., CA, USA, Technical Report CSL-98, 1979.
|
20 |
J. Saito and K. Sakurai, "Grouping Proof for RFID Tags," Int. Conf. Adv. Inf. Netw. Appl., Taipei, Taiwan, vol. 2, Mar. 28-30, 2005, pp. 621-624.
|
21 |
S. Piramuthu, "On Existence Proofs for Multiple RFID Tags," ACS/IEEE Int. Conf. Pervasive Services, Lyon, France, June 26- 29, 2006, pp. 317-320.
|
22 |
J.-S. Cho et al., "Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups," Int. Conf. Adv. Inf. Netw. Appl., Okinawa, Japan, Mar. 25-28, 2008, pp. 1591-1596.
|
23 |
C.-F. Lee et al., "Anonymous RFID Yoking Protocol Using Error Correction Codes," Int. Conf. Radio Freq. Identification Syst. Security, Singapore City, Singapore, Feb. 2010, pp. 147-157.
|
24 |
H.-Y. Chien, "Combining Rabin Cryptosystem and Error Correction Codes to Facilitate Anonymous Authentication with Un-traceability for Low-End Devices," Comput. Netw., vol. 57, no. 14, Oct. 2013, pp. 2705-2717.
DOI
|
25 |
T. Cholez et al., "Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network," Peer-to-Peer Netw. Appl., vol. 6, no. 2, June 2013, pp. 155-174.
DOI
|
26 |
P.W.L. Fong, "Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems," IEEE Symp. Security Privacy, Berkely, CA, USA, May 2011, pp. 263-278.
|
27 |
G. Danezis et al., "Sybil-Resistant DHT Routing," European Symp. Res. Comput. Security, Milan, Italy, 2005, pp. 305-318.
|
28 |
A. Singh et al., "Eclipse Attacks on Overlay Networks: Threats and Defenses," INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1-12.
|
29 |
A. Singh et al., "Defending against Eclipse Attacks on Overlay Networks," ACM Special Interest Group Operating Syst. European Workshops, Leuven, Belgium, Sept. 19-22, 2004, Article 21, pp. 1-6.
|
30 |
U. Mujahid, M. Najam-ul-islam, and J. Ahmed, "Ultra lightweight Cryptography for Passive RFID System," IACR Cryptology ePrint Archive, Report 2013/847, 2013.
|
31 |
H. Kim, "Desynchronization Attack on Hash-Based RFID Mutual Authentication Protocol," J. Security Eng., vol. 9, no. 4, Aug. 2012, pp. 357-365.
|
32 |
T.-V. Deursen and S. Radomirovic, "Security of RFID Protocols - A Case Study," Electron. Notes Theoretical Comput. Sci., vol. 244, Aug. 2009, pp. 41-52.
DOI
|
33 |
C. Aguilar, P. Gaborit, and J. Schrek, "A New Zero-Knowledge Code Based Identification Scheme with Reduced Communication," Inf. Theory Workshop, Paraty, Brazil, Oct. 16- 20, 2011, pp. 648-652.
|
34 |
A. Cerpa et al., "Habitat Monitoring Application Driver for Wireless Communication Technology," ACM SIGCOMM Workshop Data Commun., San Jose, Costa Rica, vol. 31, no. 2, Aug. 27-31, 2001, pp. 20-41.
|
35 |
J. Zhan, L.-X. Wu, and Z.-J. Tang, "Research on Ranging Accuracy Based on RSSI of Wireless Sensor Network," Int. Conf. Inf. Sci. Eng., Hangzhou, China, Dec. 4-6, 2010, pp. 2338-2341.
|
36 |
N. Dutta and S. Chellappan, "A Time-Series Clustering Approach for Sybil Attack Detection in Vehicular Ad Hoc Networks," Int. Conf. Adv. Veh. Syst., Technol. Appl., Nice, France, July 21-26, 2013, pp. 35-40.
|
37 |
B. Lee, E. Jeong, and I. Jung, "A DTSA (Detection Technique against a Sybil Attack) Protocol Using SKC (Session Key Based Certificate) on VANET," Int. J. Security its Appl., vol. 7, no. 3, May 2013, pp. 1-10.
|
38 |
T. Zhou et al., "P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks," IEEE J. Sel. Areas Commun., vol. 29, no. 3, Mar. 2011, pp. 582-594.
DOI
|
39 |
B. Niu, X. Zhu, and H. Li, "An Ultra lightweight and Privacy Preserving Authentication Protocol for Mobile RFID Systems," IEEE Wireless Commun. Netw. Conf., Shanghai, China, Apr. 7-10, 2013, pp. 1864-1869.
|
40 |
S.A. Anson and M. Ilyas, "RFID Handbook: Application Technology, Security and Privacy," Boca Raton, USA: CRC, 2008, pp. 35-64.
|
41 |
L. Zhang and Z. Wang, "Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems," Proc. Int. Conf. Grid Cooperative Comput. Workshops, Hunan, China, Oct. 21-23, 2006, pp. 463-469.
|
42 |
C. Englund and H. Wallin, "RFID in Wireless Sensor Network," M.S. thesis, Commun. Syst. Group, Dept. Signals Syst., Chalmers University of Technology, Goteborg, Sweden, Apr. 2004.
|
43 |
R.B. Ferguson, Gentag Patent Adds RFID Sensor Network Feature to Mobile Devices, Mobile News and Reviews, eWeek, Dec. 2006. Accessed Nov. 2012. http://www.eweek.com/c/a/Mobile-and-Wireless/Gentag-Patent-Adds-RFID-Sensor-Network-Feature-to-Mobile-Devices
|
44 |
A. Kumar, A. Aggarwal, and T. Charu, "Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks," Int. Conf. Contemporary Comput., Noida, India, Aug. 6-8, 2012, pp. 335-346.
|
45 |
A. Kumar, K. Gopal, and A. Aggarwal, "Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks," Int. Conf. Heterogeneous Netw. Quality, Rel., Security Robustness, Greader Noida, India, Jan. 11-12, 2013, pp. 750-763.
|
46 |
G.-S. Ahn et al., "Funneling-MAC: A Localized, Sink-Oriented MAC for Boosting Fidelity in Sensor Networks," ACM Int. Conf. Embedded Netw. Sensor Syst., Boulder, CO, USA, Nov. 1-3, 2006, pp. 293-306.
|
47 |
T. Nelson et al., "The Margrave Tool for Firewall Analysis," USENIX Large Installation Syst. Admin. Conf., San Jose, CA, USA, Nov. 7-12, 2010, pp. 1-18.
|
48 |
S. Saghafi, T. Nelson, and D.J. Dougherty, "Geometric Logic for Policy Analysis," Int. Workshop Autom. Reasoning Security Softw. Verification, Lake Placid, NY, USA, June 9, 2013, pp. 12-20.
|
49 |
D. Jackson, "Software Abstractions: Logic, Languages, and Analysis," Cambridge, MA: MIT Press, 2006.
|