Search filters

Authors whose works are in public domain in at least one jurisdiction

List of works by Aikaterini Mitrokotsa

A Note on a Privacy-Preserving Distance-Bounding Protocol

A comprehensive RFID solution to enhance inpatient medication safety

scientific article

Classifying RFID attacks and defenses

DDoS attacks and defense mechanisms: classification and state-of-the-art

article published in 2004

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Evaluation of classification algorithms for intrusion detection in MANETs

Expected loss bounds for authentication in constrained channels

scholarly article published March 2012

Guest Editors' Introduction: Special Section on Learning, Games, and Security

Integrated RFID and Sensor Networks

Intrusion Detection Using Emergent Self-organizing Maps

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

scholarly article published in International Federation for Information Processing

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Location leakage in distance bounding: Why location privacy does not work

scientific article published in 2014

Mafia fraud attack against the RČ Distance-Bounding Protocol

Near-optimal blacklisting

scientific article published in 2017

Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication

scientific article published on 28 June 2024

On Selecting the Nonce Length in Distance-Bounding Protocols

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols

On the traceability of tags in SUAP RFID authentication protocols

RFID technology, systems, and applications

article published in 2011

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Secure and Lightweight Distance-Bounding

Statistical Decision Making for Authentication and Intrusion Detection

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks

Threats to Networked RFID Systems

User-driven RFID applications and challenges

Weaknesses in another Gen2-based RFID authentication protocol