Sciweavers

RFIDSEC
2010
13 years 2 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
RFIDSEC
2010
13 years 2 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 3 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
CBRMD
2008
69views more  CBRMD 2008»
13 years 4 months ago
Procurement Fraud Discovery using Similarity Measure Learning
Abstract. This paper describes an approach to detect hints on procurement fraud. It was developed within the context of a European Union project on fraud prevention. Procurement fr...
Stefan Rüping, Natalja Punko, Björn G&uu...
DGO
2009
88views Education» more  DGO 2009»
13 years 5 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...