Research Article

A Secure Distance-Bounding Protocol with Mutual Authentication

Table 3

Information that could be accessed by an adversary in terrorist fraud attack.

Different casesInformation

Case I
Case II
Case III
Case IV
Case V
Case VI