Amanote Research

Amanote Research

    RegisterSign In

Distance-Bounding Protocols: Verification Without Time and Location

doi 10.1109/sp.2018.00001
Full Text
Open PDF
Abstract

Available in full text

Date

May 1, 2018

Authors
Sjouke MauwZach SmithJorge Toro-PozoRolando Trujillo-Rasua
Publisher

IEEE


Related search

Terrorist Fraud Resistance of Distance Bounding Protocols Employing Physical Unclonable Functions

2015English

Practical and Provably Secure Distance-Bounding

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Secure Verification of Location Claims With Simultaneous Distance Modification

English

Protocols for Watermark Verification

IEEE Multimedia
Media TechnologySignal ProcessingHardwareComputer Science ApplicationsArchitectureSoftware
2001English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

AnBx - Security Protocols Design and Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Verification of Security Protocols

English

Formal Verification of Netlog Protocols

2012English

Distance Constrained Location Problems

Industrial Engineering & Management
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy