First Page | Document Content | |
---|---|---|
![]() Date: 2005-11-25 11:04:54Applied mathematics Computing Distance-bounding protocol Complexity classes Challenge-response authentication Cryptography Radio-frequency identification IP Security token Cryptographic protocols Technology Wireless | Source URL: www.cl.cam.ac.ukDownload Document from Source WebsiteFile Size: 105,36 KBShare Document on Facebook |