Distance bounding protocols: authentication logic analysis and collusion attacks

Bibliographic Details
Main Authors: Meadows, C, Poovendran, R, Pavlovic, D, Chang, L, Syverson, P
Format: Book
Published: 2006
_version_ 1826297623640801280
author Meadows, C
Poovendran, R
Pavlovic, D
Chang, L
Syverson, P
author2 Poovendran, R
author_facet Poovendran, R
Meadows, C
Poovendran, R
Pavlovic, D
Chang, L
Syverson, P
author_sort Meadows, C
collection OXFORD
description
first_indexed 2024-03-07T04:34:29Z
format Book
id oxford-uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763f
institution University of Oxford
last_indexed 2024-03-07T04:34:29Z
publishDate 2006
record_format dspace
spelling oxford-uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763f2022-03-27T07:42:44ZDistance bounding protocols: authentication logic analysis and collusion attacksBookhttp://purl.org/coar/resource_type/c_2f33uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763fDepartment of Computer Science2006Meadows, CPoovendran, RPavlovic, DChang, LSyverson, PPoovendran, RWang, CRoy, S
spellingShingle Meadows, C
Poovendran, R
Pavlovic, D
Chang, L
Syverson, P
Distance bounding protocols: authentication logic analysis and collusion attacks
title Distance bounding protocols: authentication logic analysis and collusion attacks
title_full Distance bounding protocols: authentication logic analysis and collusion attacks
title_fullStr Distance bounding protocols: authentication logic analysis and collusion attacks
title_full_unstemmed Distance bounding protocols: authentication logic analysis and collusion attacks
title_short Distance bounding protocols: authentication logic analysis and collusion attacks
title_sort distance bounding protocols authentication logic analysis and collusion attacks
work_keys_str_mv AT meadowsc distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks
AT poovendranr distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks
AT pavlovicd distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks
AT changl distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks
AT syversonp distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks