Accès à distance ? S'identifier sur le proxy UCLouvain
How secret-sharing can defeat terrorist fraud
Primary tabs
Document type | Communication à un colloque (Conference Paper) – Présentation orale avec comité de sélection |
---|---|
Access type | Accès restreint |
Publication date | 2011 |
Language | Anglais |
Conference | "Fourth ACM Conference on Wireless Network Security", Hamburg, Germany (du 14/06/2011 au 17/06/2011) |
Peer reviewed | yes |
Host document | "Proceedings of the fourth ACM conference on Wireless network security"- p. 145-156 (ISBN : 978-1-4503-0692-8) |
Publisher | ACM |
Affiliations |
UCL
- SST/ICTM/INGI - Pôle en ingénierie informatique Université de Lyon - INSA-Lyon, CITI |
Keywords | Authentication ; Distance-bounding ; Terrorist fraud ; Mafia fraud ; Secret sharing ; Threshold cryptography ; 2660 |
Links |
Bibliographic reference | Avoine, Gildas ; Lauradoux, Cédric ; Martin, Benjamin. How secret-sharing can defeat terrorist fraud.Fourth ACM Conference on Wireless Network Security (Hamburg, Germany, du 14/06/2011 au 17/06/2011). In: Proceedings of the fourth ACM conference on Wireless network security, ACM2011, p. 145-156 |
---|---|
Permanent URL | http://hdl.handle.net/2078.1/81730 |