Secure positioning with non-ideal distance bounding protocols.
Pericle PerazzoGianluca DiniPublished in: ISCC (2015)
Keyphrases
- cryptographic protocols
- key distribution
- security protocols
- authentication protocol
- key exchange
- key establishment
- upper bound
- security properties
- multi party
- secure multiparty computation
- key agreement protocol
- euclidean distance
- distance measure
- application level
- distance function
- security issues
- distance transform
- security analysis
- encryption scheme
- security requirements
- communication protocols
- trusted third party
- electronic voting