Distance bounding protocols: authentication logic analysis and collusion attacks
Main Authors: | Meadows, C, Poovendran, R, Pavlovic, D, Chang, L, Syverson, P |
---|---|
Format: | Book |
Published: |
2006
|
Similar Items
-
Distance Hijacking Attacks on Distance Bounding Protocols
by: Cremers, C, et al.
Published: (2012) -
Distance hijacking attacks on distance bounding protocols
by: Rasmussen, K, et al.
Published: (2012) -
An encapsulated authentication logic for reasoning about key distribution protocols
by: Cervesato, I, et al.
Published: (2005) -
Deriving‚ attacking and defending the GDOI protocol
by: Meadows, C, et al.
Published: (2004) -
Bayesian Authentication: Quantifying Security of the Hancke−Kuhn Protocol
by: Pavlovic, D, et al.
Published: (2010)