Distance bounding protocols: authentication logic analysis and collusion attacks
Main Authors: | , , , , |
---|---|
Formato: | Libro |
Publicado: |
2006
|
_version_ | 1826297623640801280 |
---|---|
author | Meadows, C Poovendran, R Pavlovic, D Chang, L Syverson, P |
author2 | Poovendran, R |
author_facet | Poovendran, R Meadows, C Poovendran, R Pavlovic, D Chang, L Syverson, P |
author_sort | Meadows, C |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T04:34:29Z |
format | Book |
id | oxford-uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763f |
institution | University of Oxford |
last_indexed | 2024-03-07T04:34:29Z |
publishDate | 2006 |
record_format | dspace |
spelling | oxford-uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763f2022-03-27T07:42:44ZDistance bounding protocols: authentication logic analysis and collusion attacksBookhttp://purl.org/coar/resource_type/c_2f33uuid:cf770e71-1a55-4ffc-89b0-9fd19e3b763fDepartment of Computer Science2006Meadows, CPoovendran, RPavlovic, DChang, LSyverson, PPoovendran, RWang, CRoy, S |
spellingShingle | Meadows, C Poovendran, R Pavlovic, D Chang, L Syverson, P Distance bounding protocols: authentication logic analysis and collusion attacks |
title | Distance bounding protocols: authentication logic analysis and collusion attacks |
title_full | Distance bounding protocols: authentication logic analysis and collusion attacks |
title_fullStr | Distance bounding protocols: authentication logic analysis and collusion attacks |
title_full_unstemmed | Distance bounding protocols: authentication logic analysis and collusion attacks |
title_short | Distance bounding protocols: authentication logic analysis and collusion attacks |
title_sort | distance bounding protocols authentication logic analysis and collusion attacks |
work_keys_str_mv | AT meadowsc distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks AT poovendranr distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks AT pavlovicd distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks AT changl distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks AT syversonp distanceboundingprotocolsauthenticationlogicanalysisandcollusionattacks |