Skip to search formSkip to main contentSkip to account menu

Distance-bounding protocol

Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Real-time location systems are often required in industrial applications. In addition to securely determining an item's location… 
2019
2019
A number of distance-bounding protocols have proposed multistate exchanges. In theory this can potentially improve the security… 
2017
2017
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and… 
2014
2014
Terrorist fraud is a class of relay attacks against distance-bounding (DB) protocols in which a distant malicious prover colludes… 
2014
2014
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of… 
2013
2013
—The problem of measuring the distance between two electronic devices in the presence of an adversary is still open. Existing… 
2011
2011
Recent1y, many researchers pointed out that contactless smart-card based RFID tags which is used for proximity authentication in… 
2010
2010
RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from… 
2010
2010
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known asmafia…