First Page | Document Content | |
---|---|---|
Date: 2013-06-08 15:25:49Cryptography Distance-bounding protocol IP NP Alice and Bob Formal verification Challenge-response authentication The Verifier Transmission Control Protocol Theoretical computer science Cryptographic protocols Applied mathematics | Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David WagnerAdd to Reading ListSource URL: naveen.ksastry.comDownload Document from Source WebsiteFile Size: 203,76 KBShare Document on Facebook |