Multi-channel Protocols

(Transcript of Discussion)
  • Ford-Long Wong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)


Ben Laurie: So these protocols only work if you actually try and connect devices to each other?

Reply: Because of this type of auxiliary channel, yes, they would need to be next to each other.

Bruce Christianson: If you want to be sure that the two things that you’re holding are connected to each other and not to some third party, yes?

Reply: Yes. In the past, someone who can eavesdrop on this auxiliary channel will be able to break your system, so what we’re saying here is that with our protocol, they can eavesdrop all they like, but by the time they eavesdrop it’s too late. They have to break the hard problem, to calculate the right keys.


Radio Channel Visual Channel Congestion Charge Individual Protocol Kitchen Utensil 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ford-Long Wong
    • 1
  1. 1.University of Cambridge 

Personalised recommendations