Back to Results
First PageMeta Content
Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data


Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1
Add to Reading List

Document Date: 2013-03-16 15:45:20


Open Document

File Size: 2,51 MB

Share Result on Facebook

Company

Terrorist Fraud 1 Introduction Wireless / /

/

Event

FDA Phase / /

IndustryTerm

carrier frequency / carrier detection / carrier shifting / analog signal processing / challenge carrier frequency / proposed distance bounding protocols / appropriate reflected carrier frequency / proximity-based access control systems / low processing delay / distance bounding protocol / energy detection / analog processing techniques / analog processing / resilient distance bounding protocols / safety-critical applications / hybrid digital-analog solution / required tight processing / arbitrary processing functions / payment systems / sufficient energy / predefined carrier frequency / uses analog processing / signal reception/processing/transmission / carrier frequencies / resilient systems / digital processing / localization solutions / digital signal processing techniques / wireless networks / digital signal processing / resilient protocols / distance bounding protocols / challenge carrier / energy / be implemented using solely analog processing / /

Organization

US Federal Reserve / /

Person

Nils Ole / Boris Skori / Distance Bounding / Mafia Frauds / Dave Singel / Srdjan Capkun / /

Product

R0 / /

Technology

resilient distance bounding protocols / overlying protocol / Hancke-Kuhn protocol / Knife protocols / Knife protocol / distance bounding protocols / distance bounding protocol / DSP / proposed distance bounding protocols / /

SocialTag