Back to Results
First PageMeta Content
Information / Challenge-response authentication / IP / Commitment scheme / NP / Transmission Control Protocol / Communications protocol / Error detection and correction / Alice and Bob / Cryptographic protocols / Data / Cryptography


Distance Bounding in Noisy Environments Dave Singel´ee and Bart Preneel ESAT-COSIC, K.U.Leuven,
Add to Reading List

Open Document

File Size: 165,79 KB

Share Result on Facebook

Company

Wireless Sensor Networks / /

Country

Belgium / /

/

Event

FDA Phase / /

IndustryTerm

secure distance bounding protocols / improved distance bounding protocol / metal / mobile ad-hoc networks / clever protocol / distance bounding protocol / communication technologies / cryptographic identification protocol / mobile devices / wireless ad-hoc networks / important distance bounding protocols / noise resilient distance bounding protocols / mutual entity authentication protocols / challenge-response protocol / mutual authentication protocol / wireless networks / distance bounding protocols / noisy wireless environments / /

Person

Dave Singel´ee / Bart Preneel / Alice / Alice Bob / /

Product

Capkun / Hancke / Brands / /

PublishedMedium

the Echo / /

Technology

Echo protocol / MAD protocol / challenge-response protocol / mutual entity authentication protocols / resilient MAD protocol / mutual authentication protocol / improved distance bounding protocol / noise resilient distance bounding protocols / clever protocol / Chaum protocol / two important distance bounding protocols / distance bounding protocols / secure distance bounding protocols / cryptographic identification protocol / private key / employing distance bounding protocols / secret key / MAC algorithm / distance bounding protocol / Kuhn protocol / two communication technologies / Kuhn distance bounding protocol / mobile devices / /

SocialTag