Back to Results
First PageMeta Content
Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics


Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner
Add to Reading List

Document Date: 2013-06-08 15:25:49


Open Document

File Size: 203,76 KB

Share Result on Facebook

City

San Diego / Robotics / /

Company

Ad-Hoc Wireless Networks / AES / ACM Press / R. / Wireless Ad Hoc Networks / Elsevier Science Ltd. / Intel / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Location Claims∗ Naveen Sastry Umesh Shankar David Wagner University of California / Berkeley University of California / /

IndustryTerm

location determination algorithm / suitable small device / proposed localization algorithms / Web Representations / tamper-resistant trusted devices / tight real-time processing guarantees / context-aware mobile applications / verification protocol / in-region verification algorithm / insecure localization algorithm / metal / cryptographic solutions / sensor networks / secure localization algorithm / verifier infrastructure / packet processing delay / arbitrary computing power / 4MHz 8bit processors / wireless access / challenge-response protocol / in-region verification protocol / telecommunications infrastructure / determination algorithm / radar systems / cellular networks / claimed processing delay / ubiquitous computing / maximum processing delay / wireless network / Wireless Ethernet / location determination algorithms / non-zero processing delay / communications equipment / wireless information systems / wireless networks / wireless encryption keys / appropriate location determination algorithm / time-bounded challenge-response protocol / insecure localization protocols / secure protocol / lightweight protocol / tamper-resistant hardware / wireless control / particular protocol / prior protocol / unbounded computing power / transmission media / greater processing delay / radio communications / wireless devices / using a wireless network / /

Organization

Active Office / University of California / Berkeley University / National Science Foundation / /

Person

Avishai Wool / Lewis Girod / Ross Anderson / David B. Johnson / Tim Kindberg / Brent Waters / Philippe Debaty / Vladimir Bychkovskiy / David Culler / Stefan Brands / Kan Zhang / Jason Hill / Brian D. Noble / Chun Hu / Kristofer Pister / Deborah Estrin / David Chaum / Mark D / Hari Balakrishnan / Jeremy Elson / Robert Szewczyk / Dirk Balfanz / John A. Volpe / H. Chi Wong / Frank Stajano / Eran Gabber / Adrian Perrig / D.K. Smetters / Paul Stewart / Alec Woo / Deborah Caswell / Allen K. L. Miu / Seth Hollar / Narendar Shankar / Yih-Chun Hu / Ed Felten / Shankar David / /

/

Position

J. Teller / Protection Authentication General / /

Product

Section / /

ProgrammingLanguage

R / /

ProvinceOrState

California / /

PublishedMedium

the Echo / Lecture Notes in Computer Science / /

Technology

4.3 Evaluation The Echo protocol / dynamic algorithm / challenge-response protocol / RAM / provably secure protocol / location determination algorithm / The protocol / insecure localization protocols / 3.1 Protocol / time-bounded challenge-response protocol / appropriate location determination algorithm / intersection-based protocols / mobile devices / encryption / cryptography / wireless access / previously proposed localization algorithms / Distance-Bounding Protocols / secure localization algorithm / determination algorithm / Keyed Echo Protocol / in-region verification protocol / Echo protocol / amended protocol / insecure localization algorithm / lightweight protocol / wireless devices / prior protocol / GPS / location determination algorithms / ultrasound / cloning / 4MHz 8bit processors / Operating Systems / Ethernet / laser / 7th Security Protocols / 4.2 Coverage The Echo protocol / particular protocol / Mobile Computing / verification protocol / radio frequency / paging / Simulation / in-region verification algorithm / /

URL

www.peterson.af / http /

SocialTag