Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P. They...
6 KB (686 words) - 04:11, 5 July 2023
work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes...
8 KB (653 words) - 00:43, 20 September 2023
Needham–Schroeder protocol Wide Mouth Frog protocol Password-authenticated key agreement Salted Challenge Response Authentication Mechanism SQRL Distance-bounding protocol...
11 KB (1,540 words) - 06:34, 22 September 2024
In 1993 with Stefan Brands, Chaum introduced the concept of a distance-bounding protocol. In 2019, he was one of the speakers at the fifth Ethereum developer...
36 KB (3,446 words) - 22:00, 25 October 2024
attacks, MIFARE Plus EV1 now implements a basic "ISO compliant" distance-bounding protocol. This puts tighter timing constraints on the permitted round-trip...
77 KB (6,850 words) - 17:36, 5 October 2024
reached by the bounding team, they now assume overwatch positions while the other team then becomes the bounding team. By using bounding overwatch, this...
5 KB (675 words) - 07:45, 17 September 2023
encryption • Disk encryption hardware • Disk encryption software • Distance-bounding protocol • Distinguishing attack • Distributed.net • DMA attack • dm-crypt...
67 KB (2,933 words) - 12:41, 17 October 2024
Voice over IP (redirect from Voice over internet protocol)
Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication...
84 KB (9,926 words) - 02:15, 31 October 2024
Dijkstra's algorithm (redirect from Dijkstra's distance algorithm)
A common application of shortest path algorithms is network routing protocols, most notably IS-IS (Intermediate System to Intermediate System) and OSPF...
46 KB (5,894 words) - 15:25, 27 October 2024
Wireless ad hoc network (redirect from Maximum-Residual Multicast Protocol)
new routing protocol, which was known as ABR – associativity-based routing. Perkins eventually proposed DSDV – Destination Sequence Distance Vector routing...
53 KB (6,498 words) - 20:21, 10 October 2024
Chord (peer-to-peer) (redirect from Chord protocol)
In computing, Chord is a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning...
17 KB (2,496 words) - 23:35, 24 July 2023
H.323 (redirect from H.323 protocol)
ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audio-visual communication sessions on any packet network....
28 KB (3,733 words) - 19:39, 17 March 2024
Quantum cryptography (section Y-00 protocol)
increasing transmission distances. Recent studies have allowed important advancements in this regard. In 2018, the protocol of twin-field QKD was proposed...
81 KB (9,042 words) - 15:37, 28 October 2024
Kademlia (redirect from Kademlia P2P protocol)
Sybil attacks. Peer-to-peer networks are made of nodes, by design. The protocols that these nodes use to communicate, and locate information, have become...
28 KB (4,202 words) - 23:21, 14 August 2024
A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery...
20 KB (2,887 words) - 16:00, 20 October 2024
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames....
44 KB (5,587 words) - 11:35, 7 July 2024
Interplanetary Internet (section Protocol)
Interplanetary communication is greatly delayed by interplanetary distances, so a new set of protocols and technologies that are tolerant to large delays and errors...
32 KB (3,398 words) - 05:21, 23 August 2024
Secure multi-party computation (redirect from Virtual Party Protocol)
cryptography was about concealing content, while this new type of computation and protocol is about concealing partial information about data while computing with...
42 KB (5,883 words) - 16:33, 19 October 2024
Quantum key distribution (redirect from E91 protocol)
(QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce...
102 KB (11,760 words) - 10:21, 2 November 2024
Rabies (redirect from Milwaukee protocol)
from less than one week to more than one year. The time depends on the distance the virus must travel along peripheral nerves to reach the central nervous...
86 KB (9,300 words) - 22:46, 2 November 2024
Bellman–Ford algorithm (category Graph distance)
Bellman–Ford algorithm is used in distance-vector routing protocols, for example the Routing Information Protocol (RIP). The algorithm is distributed...
20 KB (2,669 words) - 12:04, 25 October 2024
Handle System (redirect from Handle protocol)
Force (IETF); it includes an open set of protocols, a namespace, and a reference implementation of the protocols. Documentation, software, and related information...
23 KB (3,047 words) - 01:19, 4 November 2024
the definition of "combatant" is found in Article 43 (2) of Additional Protocol I to the 1949 Geneva Conventions: "Members of the armed forces of a Party...
13 KB (1,650 words) - 02:48, 14 August 2024
XMPP (Extensible Messaging and Presence Protocol) SIMPLE (instant messaging protocol) (Session Initiation Protocol for Instant Messaging and Presence Leveraging...
10 KB (1,095 words) - 00:03, 24 August 2024
the addition of the blue border after construction of the red field. The bounding rectangle of the red field alone has the rational aspect ratio 3:4 (=1:1...
17 KB (1,628 words) - 23:38, 28 October 2024
Mental poker (section A non-shuffling poker protocol)
a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted third party. The term is also applied to...
15 KB (2,399 words) - 22:20, 4 April 2023
64b/66b encoding (section Hamming distance)
lasers that were not expected[when?] to be available for several years. The protocol overhead of a coding scheme is the ratio of the number of raw payload bits...
12 KB (1,740 words) - 20:36, 30 July 2024
Routing in delay-tolerant networking (category Network protocols)
environments, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. This is due to these protocols trying to first establish a complete...
29 KB (4,129 words) - 23:47, 10 March 2023
for a complete set of protocols for wireless infrared communications, and the name "IrDA" also refers to that set of protocols. The main reason for using...
15 KB (1,495 words) - 21:22, 25 April 2024