• Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P. They...
    6 KB (686 words) - 04:11, 5 July 2023
  • Thumbnail for David Chaum
    In 1993 with Stefan Brands, Chaum introduced the concept of a distance-bounding protocol. In 2019, he was one of the speakers at the fifth Ethereum developer...
    36 KB (3,446 words) - 19:44, 6 October 2024
  • work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes...
    8 KB (653 words) - 00:43, 20 September 2023
  • Needham–Schroeder protocol Wide Mouth Frog protocol Password-authenticated key agreement Salted Challenge Response Authentication Mechanism SQRL Distance-bounding protocol...
    11 KB (1,540 words) - 06:34, 22 September 2024
  • Thumbnail for MIFARE
    attacks, MIFARE Plus EV1 now implements a basic "ISO compliant" distance-bounding protocol. This puts tighter timing constraints on the permitted round-trip...
    77 KB (6,850 words) - 17:36, 5 October 2024
  • encryption • Disk encryption hardware • Disk encryption software • Distance-bounding protocol • Distinguishing attack • Distributed.net • DMA attack • dm-crypt...
    67 KB (2,933 words) - 12:41, 17 October 2024
  • Thumbnail for Bounding overwatch
    reached by the bounding team, they now assume overwatch positions while the other team then becomes the bounding team. By using bounding overwatch, this...
    5 KB (675 words) - 07:45, 17 September 2023
  • Thumbnail for Dijkstra's algorithm
    A common application of shortest path algorithms is network routing protocols, most notably IS-IS (Intermediate System to Intermediate System) and OSPF...
    46 KB (5,896 words) - 19:55, 12 October 2024
  • new routing protocol, which was known as ABR – associativity-based routing. Perkins eventually proposed DSDV – Destination Sequence Distance Vector routing...
    53 KB (6,498 words) - 20:21, 10 October 2024
  • In computing, Chord is a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning...
    17 KB (2,496 words) - 23:35, 24 July 2023