Login / Signup
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks.
Aslí Bay
Ioana Boureanu
Aikaterini Mitrokotsa
Iosif Spulber
Serge Vaudenay
Published in:
Inscrypt (2012)
Keyphrases
</>
security protocols
cryptographic protocols
upper bound
distance measure
distance function
euclidean distance
distance transform
computer security
denial of service attacks
data mining
communication protocols
malicious attacks
terrorist attacks