{"id":"https://openalex.org/W3022866184","doi":"https://doi.org/10.3390/cryptography4020014","title":"On Detecting Relay Attacks on RFID Systems Using Qubits","display_name":"On Detecting Relay Attacks on RFID Systems Using Qubits","publication_year":2020,"publication_date":"2020-05-08","ids":{"openalex":"https://openalex.org/W3022866184","doi":"https://doi.org/10.3390/cryptography4020014","mag":"3022866184"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography4020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography4020014","pdf_url":"https://www.mdpi.com/2410-387X/4/2/14/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/4/2/14/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071946922","display_name":"Aysajan Abidin","orcid":"https://orcid.org/0000-0002-5128-3608"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Aysajan Abidin","raw_affiliation_strings":["imec-COSIC KU Leuven, Kasteelpark Arenberg 10-bus 2452, 3001 Heverlee, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC KU Leuven, Kasteelpark Arenberg 10-bus 2452, 3001 Heverlee, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5071946922"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.1912,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55783875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"2","first_page":"14","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.8077203035354614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7123005986213684},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6632196307182312},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6494229435920715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6326208710670471},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.547653317451477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5244669914245605},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47316035628318787},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11702221632003784}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.8077203035354614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7123005986213684},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6632196307182312},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6494229435920715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6326208710670471},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.547653317451477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5244669914245605},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47316035628318787},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11702221632003784},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography4020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography4020014","pdf_url":"https://www.mdpi.com/2410-387X/4/2/14/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/654466","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/654466","pdf_url":"https://lirias.kuleuven.be/retrieve/93554113-b0e9-4fc3-be23-f699aeb44dd5","source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Cryptography, vol. 4 (2), Art.No. 14","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:c5bde7c9af4f484395a121cb48d5ab19","is_oa":true,"landing_page_url":"https://doaj.org/article/c5bde7c9af4f484395a121cb48d5ab19","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 4, Iss 2, p 14 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/4/2/14/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography4020014","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography4020014","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography4020014","pdf_url":"https://www.mdpi.com/2410-387X/4/2/14/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G4009224933","display_name":null,"funder_award_id":"C16/15/058","funder_id":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven"},{"id":"https://openalex.org/G4435414571","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320327336","funder_display_name":"Vlaamse regering"},{"id":"https://openalex.org/G7977722673","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven"},{"id":"https://openalex.org/G99346115","display_name":null,"funder_award_id":"C16/15/058","funder_id":"https://openalex.org/F4320322681","funder_display_name":"Onderzoeksraad, KU Leuven"}],"funders":[{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320322681","display_name":"Onderzoeksraad, KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3022866184.pdf","grobid_xml":"https://content.openalex.org/works/W3022866184.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1494610650","https://openalex.org/W1533298133","https://openalex.org/W1593865393","https://openalex.org/W1595740013","https://openalex.org/W1598297854","https://openalex.org/W1869599893","https://openalex.org/W1990263075","https://openalex.org/W1991182862","https://openalex.org/W2015179126","https://openalex.org/W2042358705","https://openalex.org/W2043659124","https://openalex.org/W2052588393","https://openalex.org/W2101188359","https://openalex.org/W2127785555","https://openalex.org/W2155481610","https://openalex.org/W2269598925","https://openalex.org/W2489094720","https://openalex.org/W2514952571","https://openalex.org/W2590291967","https://openalex.org/W2613836390","https://openalex.org/W2792859366","https://openalex.org/W2794645714","https://openalex.org/W2945361256","https://openalex.org/W2987687226","https://openalex.org/W6608003095","https://openalex.org/W6631925621","https://openalex.org/W6635934954","https://openalex.org/W6679132701"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2539674285","https://openalex.org/W2362741838","https://openalex.org/W1038122923","https://openalex.org/W1998322187","https://openalex.org/W2952514781","https://openalex.org/W622044715","https://openalex.org/W3019210376","https://openalex.org/W2391145594"],"abstract_inverted_index":{"As":[0],"RFID":[1,22],"technology":[2],"is":[3],"being":[4],"widely":[5],"used":[6],"in":[7],"access":[8],"control":[9],"systems":[10,23],"to":[11,25,29,77,96,109],"identify":[12],"and":[13,17,52,70,112],"track":[14],"both":[15],"objects":[16],"people,":[18],"relay":[19,33,79],"attacks":[20,80],"on":[21,49,101],"continue":[24],"pose":[26],"serious":[27],"threats":[28],"security.":[30],"To":[31],"mitigate":[32],"attacks,":[34],"distance":[35,44],"bounding":[36,45],"protocols":[37,46],"can":[38],"be":[39],"used.":[40],"Until":[41],"recently,":[42],"all":[43],"were":[47],"based":[48],"classical":[50],"cryptography":[51],"communication":[53],"techniques.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"take":[59],"a":[60,64,90,98,107],"closer":[61],"look":[62],"at":[63],"recently":[65],"proposed":[66],"protocol":[67,88,116],"by":[68],"Jannati":[69],"Ardeshir-Larijani":[71],"[Quantum":[72],"Information":[73],"Processing":[74],"2016,":[75],"18]":[76],"detect":[78],"using":[81],"qubits.":[82],"We":[83,104],"first":[84],"observe":[85],"that":[86],"the":[87,102,114,118,121],"has":[89],"weakness":[91],"which":[92],"allows":[93],"an":[94],"adversary":[95],"mount":[97],"successful":[99],"attack":[100],"protocol.":[103],"then":[105],"propose":[106],"countermeasure":[108],"restore":[110],"security":[111],"compare":[113],"fixed":[115],"with":[117],"state":[119],"of":[120],"art.":[122]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2020-05-13T00:00:00"}
