Revisiting two-hop distance-bounding protocols: Are you really close enough?
Paper in proceeding, 2018
Relay attacks
Authentication
Distance-bounding
Author
Nektaria Kaloudi
University of the Aegean
Aikaterini Mitrokotsa
Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
03029743 (ISSN) 16113349 (eISSN)
Vol. 10741 LNCS 177-188978-3-319-93523-2 (ISBN)
Heraklion, Greece,
Subject Categories
Computer Engineering
Telecommunications
Communication Systems
DOI
10.1007/978-3-319-93524-9_12