First Page | Document Content | |
---|---|---|
![]() Date: 2012-08-29 07:20:33Applied mathematics Distance-bounding protocol IP NEXPTIME Formal verification Alice and Bob Public-key cryptography Man-in-the-middle attack Interactive proof system Cryptography Cryptographic protocols Theoretical computer science | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 637,74 KBShare Document on Facebook |