Distance-Bounding Protocols: Are You Close Enough?
Other text in scientific journal, 2015

Distance-bounding protocols can offer protection against attacks on access control systems that require users to both verify their credentials and prove their location. However, tradeoffs among accuracy, cost, and privacy are necessary.

security

Computer Science

authentication

distance bounding

provable security

man-in-the-middle

Author

Christos Dimitrakakis

Chalmers, Computer Science and Engineering (Chalmers), Computing Science (Chalmers)

Aikaterini Mitrokotsa

Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

IEEE Security and Privacy

1540-7993 (ISSN) 15584046 (eISSN)

Vol. 13 4 47-51 7180229

Subject Categories

Software Engineering

DOI

10.1109/msp.2015.87

More information

Latest update

4/5/2022 6