Research Article
A Secure Distance-Bounding Protocol with Mutual Authentication
Table 2
Notations used in designing our protocol.
| Notations | Explanations |
| | Symmetric secret key | | Pseudorandom function | | Random numbers | | Bits | | Challenge bit in the th round | | Response bit in the th round |
|
|