On the Security of HB# against a Man-in-the-Middle Attack
Related publications (32)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We develop a least mean-squares (LMS) diffusion strategy for sensor network applications where it is desired to estimate parameters of physical phenomena that vary over space. In particular, we consider a regression model with space-varying parameters that ...
Most hydrological models are valid at most only in a few places and cannot be reasonably transferred to other places or to far distant time periods. Transfer in space is difficult because the models are conditioned on past observations at particular places ...
When a phenomenon is described by a parametric model and multiple datasets are available, a key problem in statistics is to discover which datasets are characterized by the same parameter values. Equivalently, one is interested in partitioning the family o ...
Researchers and developers typically use I-V curves (current vs. potential) as a means to demonstrate good data fitting of a model under experimental validation. Despite the popularity of this method, assessment of the results can be intuitive rather than ...
This paper is concerned with the numerical solution of symmetric large-scale Lyapunov equations with low-rank right-hand sides and coefficient matrices depending on a parameter. Specifically, we consider the situation when the parameter dependence is suffi ...
Sequence dependent mechanics of DNA is believed to play a central role in the functioning of the cell through the expression of genetic information. Nucleosome positioning, gene regulation, DNA looping and packaging within the cell are only some of the pro ...
At ACM~CCS 2008, Rasmussen and Capkun introduced a distance-bounding protocol RC07 (henceforth RC protocol) where the prover and verifier use simultaneous transmissions and the verifier counts the delay between sending a challenge (starting with a hidden m ...
Microscopic simulation models have become widely applied tools in traffic engineering. Nevertheless, parameter identification of these models remains a difficult task. This is for one caused by the fact that parameters are generally not directly observable ...
Among emerging pollutants found in surface and ground waters, pharmaceuticals are currently receiving a particular interest. There are several physico/chemical parameters that could describe the fate of pharmaceuticals in the environment, so as their toxic ...
Identification of kinetic models is an important task for monitoring, control and optimization of industrial processes. Kinetic models are often based on first principles, which describe the evolution of the states – numbers of moles, temperature and volum ...