Login / Signup
Distance Hijacking Attacks on Distance Bounding Protocols.
Cas Cremers
Kasper Bonne Rasmussen
Srdjan Capkun
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
distance function
distance measure
data sets
distance measurement
neural network
search engine
distance matrix
malicious users