Skip to search formSkip to main contentSkip to account menu

Distance-bounding protocol

Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and… 
2014
2014
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of… 
2011
2011
Recent1y, many researchers pointed out that contactless smart-card based RFID tags which is used for proximity authentication in… 
2010
2010
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known asmafia… 
2010
2010
RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from…