Back to Results
First PageMeta Content
Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics


Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner
Add to Reading List

Document Date: 2013-06-08 15:25:49


Open Document

File Size: 203,76 KB

Share Result on Facebook
UPDATE