Skip to content
VuFind
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Distance bounding protocols: a...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
Distance bounding protocols: authentication logic analysis and collusion attacks
Bibliographic Details
Main Authors:
Meadows, C
,
Poovendran, R
,
Pavlovic, D
,
Chang, L
,
Syverson, P
Format:
Book
Published:
2006
Holdings
Description
Similar Items
Staff View
Similar Items
Distance Hijacking Attacks on Distance Bounding Protocols
by: Cremers, C, et al.
Published: (2012)
Distance hijacking attacks on distance bounding protocols
by: Rasmussen, K, et al.
Published: (2012)
An encapsulated authentication logic for reasoning about key distribution protocols
by: Cervesato, I, et al.
Published: (2005)
Deriving‚ attacking and defending the GDOI protocol
by: Meadows, C, et al.
Published: (2004)
Bayesian Authentication: Quantifying Security of the Hancke−Kuhn Protocol
by: Pavlovic, D, et al.
Published: (2010)