Back to Results
First PageMeta Content
Applied mathematics / Distance-bounding protocol / IP / NEXPTIME / Formal verification / Alice and Bob / Public-key cryptography / Man-in-the-middle attack / Interactive proof system / Cryptography / Cryptographic protocols / Theoretical computer science


Document Date: 2012-08-29 07:20:33


Open Document

File Size: 637,74 KB

Share Result on Facebook

City

Dept. / /

Company

Brands / S&P / Chaum / /

Country

Switzerland / /

Currency

pence / /

Facility

Institute of Information Security / University of California / /

IndustryTerm

wireless terminal / granted wireless access / distance bounding protocol / analog processing / system could consider using a protocol / digital processing / distance-bounding protocols / prominent distance bounding protocols / distance bounding protocols / /

Organization

Institute of Information Security / University of California / Irvine / /

Person

V . As / Srdjan Capkun / Distance Hijacking / /

ProvinceOrState

California / /

Technology

analyzing distance bounding protocols / using distance bounding protocols / prominent distance bounding protocols / proposed protocols / public key / wireless access / recent CRCS protocol / Chaum protocol / one distance bounding protocol / distance bounding protocols / distance-bounding protocols / private key / distance bounding protocol / Kuhn protocol / /

SocialTag