Skip to search formSkip to main contentSkip to account menu

Distance-bounding protocol

Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Real-time location systems are often required in industrial applications. In addition to securely determining an item's location… 
2019
2019
A number of distance-bounding protocols have proposed multistate exchanges. In theory this can potentially improve the security… 
2017
2017
Distance bounding(DB) protocol is a critical solution to preventing distance attacks. Since the traditional DB protocols can only… 
2017
2017
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and… 
2014
2014
Terrorist fraud is a class of relay attacks against distance-bounding (DB) protocols in which a distant malicious prover colludes… 
2013
2013
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when designing such protocols is… 
Review
2013
Review
2013
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle… 
2010
2010
RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from… 
2010
2010
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known asmafia… 
2008
2008
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia…