• Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P. They...
    6 KB (686 words) - 04:11, 5 July 2023
  • Thumbnail for David Chaum
    In 1993 with Stefan Brands, Chaum introduced the concept of a distance-bounding protocol. In 2019, he was one of the speakers at the fifth Ethereum developer...
    36 KB (3,447 words) - 20:09, 15 January 2025
  • work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes...
    8 KB (653 words) - 00:43, 20 September 2023
  • Needham–Schroeder protocol Wide Mouth Frog protocol Password-authenticated key agreement Salted Challenge Response Authentication Mechanism SQRL Distance-bounding protocol...
    11 KB (1,540 words) - 19:04, 12 December 2024
  • Thumbnail for MIFARE
    attacks, MIFARE Plus EV1 now implements a basic "ISO compliant" distance-bounding protocol. This puts tighter timing constraints on the permitted round-trip...
    77 KB (6,848 words) - 08:27, 20 January 2025
  • encryption • Disk encryption hardware • Disk encryption software • Distance-bounding protocol • Distinguishing attack • Distributed.net • DMA attack • dm-crypt...
    67 KB (2,933 words) - 10:14, 4 January 2025
  • Thumbnail for Bounding overwatch
    reached by the bounding team, they now assume overwatch positions while the other team then becomes the bounding team. By using bounding overwatch, this...
    5 KB (675 words) - 07:45, 17 September 2023
  • Thumbnail for Dijkstra's algorithm
    A common application of shortest path algorithms is network routing protocols, most notably IS-IS (Intermediate System to Intermediate System) and OSPF...
    45 KB (5,644 words) - 10:26, 31 January 2025
  • new routing protocol, which was known as ABR – associativity-based routing. Perkins eventually proposed DSDV – Destination Sequence Distance Vector routing...
    53 KB (6,496 words) - 01:12, 30 January 2025
  • In computing, Chord is a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning...
    17 KB (2,496 words) - 22:07, 25 November 2024
  • increasing transmission distances. Recent studies have allowed important advancements in this regard. In 2018, the protocol of twin-field QKD was proposed...
    81 KB (9,073 words) - 03:50, 27 January 2025
  • Internet Protocol (VoIP), also known as IP telephony, refers to a set of technologies used for voice communication sessions over Internet Protocol (IP) networks...
    88 KB (10,317 words) - 19:51, 16 January 2025
  • A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery...
    20 KB (2,887 words) - 15:26, 17 November 2024
  • allows to find all nodes at the specified logarithmic distance, has a differentiation of sub-protocols. Overnet: With KadC a C library for handling its Kademlia...
    28 KB (4,223 words) - 13:03, 20 January 2025
  • Thumbnail for H.323
    H.323 (redirect from H.323 protocol)
    ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audio-visual communication sessions on any packet network....
    28 KB (3,726 words) - 19:39, 17 March 2024
  • The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames....
    44 KB (5,503 words) - 07:05, 4 January 2025
  • Thumbnail for Interplanetary Internet
    Interplanetary communication is greatly delayed by interplanetary distances, so a new set of protocols and technologies that are tolerant to large delays and errors...
    32 KB (3,389 words) - 03:16, 24 December 2024
  • Thumbnail for Rabies
    Rabies (redirect from Milwaukee protocol)
    from less than one week to more than one year. The time depends on the distance the virus must travel along peripheral nerves to reach the central nervous...
    87 KB (9,368 words) - 14:24, 1 February 2025
  • (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce...
    102 KB (11,755 words) - 19:12, 20 January 2025
  • cryptography was about concealing content, while this new type of computation and protocol is about concealing partial information about data while computing with...
    42 KB (5,909 words) - 07:21, 19 January 2025
  • Thumbnail for Online chat
    XMPP (Extensible Messaging and Presence Protocol) SIMPLE (instant messaging protocol) (Session Initiation Protocol for Instant Messaging and Presence Leveraging...
    26 KB (2,721 words) - 12:37, 27 December 2024
  • Thumbnail for Flag of Nepal
    the addition of the blue border after construction of the red field. The bounding rectangle of the red field alone has the rational aspect ratio 3:4 (=1:1...
    18 KB (1,664 words) - 15:19, 22 January 2025
  • Thumbnail for First aid
    other known protocols that could be mentioned in many contexts (in alphabetical order): AMEGA protocol It is similar to the European protocol, because it...
    46 KB (5,506 words) - 14:33, 1 February 2025
  • lasers that were not expected[when?] to be available for several years. The protocol overhead of a coding scheme is the ratio of the number of raw payload bits...
    12 KB (1,750 words) - 11:48, 16 November 2024
  • EtherCAT (section Protocol)
    an Ethernet-based fieldbus system developed by Beckhoff Automation. The protocol is standardized in IEC 61158 and is suitable for both hard and soft real-time...
    25 KB (3,001 words) - 14:26, 22 January 2025
  • Thumbnail for Bellman–Ford algorithm
    Bellman–Ford algorithm (category Graph distance)
    Bellman–Ford algorithm is used in distance-vector routing protocols, for example the Routing Information Protocol (RIP). The algorithm is distributed...
    21 KB (2,715 words) - 14:55, 27 November 2024
  • a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted third party. The term is also applied to...
    15 KB (2,399 words) - 22:20, 4 April 2023
  • Thumbnail for Local area network
    the higher network layers, protocols such as NetBIOS, IPX/SPX, AppleTalk and others were once common, but the Internet protocol suite (TCP/IP) has prevailed...
    28 KB (2,863 words) - 05:34, 31 January 2025
  • Bob are each given a string, then any communication protocol used to compute the Hamming distance between their strings does (asymptotically) no better...
    5 KB (765 words) - 01:36, 1 February 2023
  • Thumbnail for Calipers
    Calipers (category Length, distance, or range measuring devices)
    is 52 bits arranged as 13 nibbles. Sylvac interface. This is the common protocol for inexpensive, non-name brand, calipers. Format is 24-bit 90 kHz synchronous...
    34 KB (3,796 words) - 03:22, 28 January 2025