Back to Results
First PageMeta Content
Challenge-response authentication / Commitment scheme / IP / Zero-knowledge proof / Distance-bounding protocol / NP / Cryptographic nonce / Alice and Bob / Public-key cryptography / Cryptography / Cryptographic protocols / Complexity classes


Document Date: 2008-07-23 09:02:44


Open Document

File Size: 318,17 KB

Share Result on Facebook

City

Leuven / /

Company

AES / Marc Vauclair NXP Semiconductors / /

Country

Belgium / /

/

Event

FDA Phase / /

IndustryTerm

ad-hoc wireless networks / cryptographic solutions / content protection systems / cryptographic proximity protocol / zero-knowledge protocols / authentication protocol / distance-bounding protocol / secure protocols / basic protocol / e.g. authentication protocols / sensor networks / security protocol / secure distance-bounding protocol / simplest distance bounding protocol / secure solution / et al. protocol / protocol / ad-hoc networks / proximity-proving protocol / heterogeneous systems / travel time / symmetric cryptographic algorithms / zero-knowledge protocol / digital rights management systems / Distance-bounding protocols / accuracy special hardware / malicious device / distance measuring protocol / energy / /

Position

model / e.g / /

Product

Another solution / /

Technology

encryption / cryptographic proximity protocol / existing protocols / authentication protocol / security protocol / distance-bounding protocol / public key / distance measuring protocol / known distance-bounding protocols / known protocols / proximity-proving protocol / public-key encryption / considered protocol / basic protocol / e.g. authentication protocols / zero-knowledge protocol / following protocol / Sastry et al. protocol / secure distance-bounding protocol / Distance-bounding protocols / private key / zero-knowledge protocols / simplest distance bounding protocol / This protocol / secret key / mobile device / symmetric cryptographic algorithms / Indeed symmetric cryptographic algorithms / recently distance-bounding protocols / proposed protocol / Threat Model The protocol / /

SocialTag