Security Standardisation Research: Second International by Liqun Chen, Shin'ichiro Matsuo

By Liqun Chen, Shin'ichiro Matsuo

This ebook constitutes the refereed complaints of the second one overseas convention on defense Standardisation examine, SSR 2015, held in Tokyo, Japan, in December 2015.
The thirteen papers awarded during this quantity have been rigorously reviewed and chosen from 18 submissions. they're prepared in topical sections named: bitcoin and check; protocol and API; research on cryptographic set of rules; privateness; and belief and formal research.

Show description

Read or Download Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings PDF

Best security books

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Every body wishes privateness and defense on-line, anything that almost all desktop clients have roughly given up on so far as their own information is worried. there is not any scarcity of fine encryption software program, and no scarcity of books, articles and essays that purport to be approximately easy methods to use it. but there's valuable little for usual clients who wish barely enough information regarding encryption to take advantage of it appropriately and securely and appropriately--WITHOUT having to develop into specialists in cryptography.

Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

This can be an exam of "Comprehensive safety" as a coverage that is going past the necessities of army defence opposed to a selected "enemy" to emphasize the necessity to keep in mind different points very important to nationwide balance: foodstuff, strength, setting, verbal exchange and social defense.

Protecting Human Security in Africa

Maintaining Human safety in Africa discusses probably the most powerful threats to human defense in Africa. It offers specially with these threats to the safety of African humans that are least understood or explored. In topics various from corruption, the proliferation of small hands and light-weight guns, meals protection, the devastation of inner displacement in Africa, the hyperlink among typical assets and human defense, to the issues of pressured labour, threatsto women's safety, and environmental safeguard, the e-book examines the criminal and coverage demanding situations of shielding human protection in Africa.

Extra info for Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings

Example text

It is known that NFC payment is vulnerable to different types of Man-In-TheMiddle (MITM) attacks [21], also known in the literature as relay, or wormhole attacks [19]. In a simple form of a relay attack known as ghost-and-leech attack [22], the attacker places an NFC reader so as to secretly interrogate the user’s NFC card without the user’s awareness, and relays the card response to a remote NFC reader to obtain a payment from the victim’s account. Such an attack is demonstrated in [20,21]. Relay attacks can be countered in a number of ways.

Com. com/iphone-6/apple-pay. com/intl/en us/pay. com. Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment 23 pay for something more expensive. Figure 1 shows an example of such an attack. This attack has been shown to be feasible in [19]. Unlike simple relay attacks, the Mafia attack cannot be prevented by using a protective shield or an activation button since the user consciously initiates the payment. For the same reason, various user-movement-based unlocking mechanisms [18,30,32,37] cannot stop the attack either.

4717, pp. 304–317. Springer, Heidelberg (2007) 16. : Distance bounding protocols. In: Helleseth, T. ) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994) 17. : How users associate wireless devices. In: Proceedingsof the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 1909–1918. ACM, New York, (2011) 18. : RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with contextawarecommunications. In: Proceedings of the 15th ACM conference on Computerand communications security, pp.

Download PDF sample

Rated 4.29 of 5 – based on 6 votes