View Document Preview and Link
Document Date: 2013-06-08 15:25:49 Open Document File Size: 203,76 KB Share Result on Facebook
City San Diego / Robotics / / Company Ad-Hoc Wireless Networks / AES / ACM Press / R. / Wireless Ad Hoc Networks / Elsevier Science Ltd. / Intel / / Country United States / / Currency USD / / / Event FDA Phase / / Facility Location Claims∗ Naveen Sastry Umesh Shankar David Wagner University of California / Berkeley University of California / / IndustryTerm location determination algorithm / suitable small device / proposed localization algorithms / Web Representations / tamper-resistant trusted devices / tight real-time processing guarantees / context-aware mobile applications / verification protocol / in-region verification algorithm / insecure localization algorithm / metal / cryptographic solutions / sensor networks / secure localization algorithm / verifier infrastructure / packet processing delay / arbitrary computing power / 4MHz 8bit processors / wireless access / challenge-response protocol / in-region verification protocol / telecommunications infrastructure / determination algorithm / radar systems / cellular networks / claimed processing delay / ubiquitous computing / maximum processing delay / wireless network / Wireless Ethernet / location determination algorithms / non-zero processing delay / communications equipment / wireless information systems / wireless networks / wireless encryption keys / appropriate location determination algorithm / time-bounded challenge-response protocol / insecure localization protocols / secure protocol / lightweight protocol / tamper-resistant hardware / wireless control / particular protocol / prior protocol / unbounded computing power / transmission media / greater processing delay / radio communications / wireless devices / using a wireless network / / Organization Active Office / University of California / Berkeley University / National Science Foundation / / Person Avishai Wool / Lewis Girod / Ross Anderson / David B. Johnson / Tim Kindberg / Brent Waters / Philippe Debaty / Vladimir Bychkovskiy / David Culler / Stefan Brands / Kan Zhang / Jason Hill / Brian D. Noble / Chun Hu / Kristofer Pister / Deborah Estrin / David Chaum / Mark D / Hari Balakrishnan / Jeremy Elson / Robert Szewczyk / Dirk Balfanz / John A. Volpe / H. Chi Wong / Frank Stajano / Eran Gabber / Adrian Perrig / D.K. Smetters / Paul Stewart / Alec Woo / Deborah Caswell / Allen K. L. Miu / Seth Hollar / Narendar Shankar / Yih-Chun Hu / Ed Felten / Shankar David / / / Position J. Teller / Protection Authentication General / / Product Section / / ProgrammingLanguage R / / ProvinceOrState California / / PublishedMedium the Echo / Lecture Notes in Computer Science / / Technology 4.3 Evaluation The Echo protocol / dynamic algorithm / challenge-response protocol / RAM / provably secure protocol / location determination algorithm / The protocol / insecure localization protocols / 3.1 Protocol / time-bounded challenge-response protocol / appropriate location determination algorithm / intersection-based protocols / mobile devices / encryption / cryptography / wireless access / previously proposed localization algorithms / Distance-Bounding Protocols / secure localization algorithm / determination algorithm / Keyed Echo Protocol / in-region verification protocol / Echo protocol / amended protocol / insecure localization algorithm / lightweight protocol / wireless devices / prior protocol / GPS / location determination algorithms / ultrasound / cloning / 4MHz 8bit processors / Operating Systems / Ethernet / laser / 7th Security Protocols / 4.2 Coverage The Echo protocol / particular protocol / Mobile Computing / verification protocol / radio frequency / paging / Simulation / in-region verification algorithm / / URL www.peterson.af / http / SocialTag