Suche
Ergebnisse
-
A distance hijacking attack on the CRCS distance bounding protocol
(2011)Technical Report / ETH Zurich, Department of Computer ScienceIn [2], Rasmussen and Capkun present a practical distance verification mechanism and use it to construct the first practical distance bounding protocol. In this paper we show that the protocol is vulnerable to what we call a distance hijacking attack, in which a malicious prover Q can convince the verifier V that he is at the same distance as some honest prover P, even though Q is further from V than P, by inserting his own identity into ...Report -
Über Mobilität von Studenten und Gelehrten zwischen dem Reich und Italien (1400–1600)
(2011)Repertorium Academicum Germanicum (RAG) - ForschungenReport -
Quality control and monitoring of electrically isolated post-tensioning tendons in bridges
(2011)Eidgenössisches Departement für Umwelt, Verkehr, Energie und Kommunikation UVEK, Bundesamt für StrassenReport -
-
SymPhone
(2011)Technical Report / ETH Zurich, Department of Computer ScienceVoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. In this paper, we explore making VoIP available on a mobile phone. For that purpose, we propose an architecture and describe the various components involved. Data entering and leaving the mobile phone is encapsulated in a wireless Bluetooth connection. The bridge to the Internet is provided ...Report -
A Time Machine for XML
(2011)Technical ReportWith sinking storage costs, it becomes more and more feasible, and popular, to retain past versions of documents and data. While undoing changes is worthy, this becomes even more valuable if the data is queryable. Nowadays, there are two widespread version control paradigms: document versioning (SVN, git, etc.) and versioned databases. The former handles any kind of document, even binary, but only sees lines of text, so that the query ...Report -
Comparing state spaces in automatic security protocol verification
(2011)Technical Report / ETH Zurich, Department of Computer ScienceReport -
Shared queries in sensor networks for multi-user support
(2011)Technical Report / ETH Zurich, Department of Computer ScienceWireless sensor networks are still quite limiting in the way they can be programmed and used. For instance, most existing platforms for sensors networks allow only a single application or user to run on them. This makes it difficult to, e.g., have mobile users connecting to a local sensor network as they arrive at a new location. In this paper we tackle the problem of supporting different applications over the same sensor network. The ...Report -