1 |
S. Brands and D. Chaum, "Distance-Bounding Protocols", Advances in Cryptology, EUROCRYPT'93", Vol. 765 of LNCS, pp. 344-359, 1993.
|
2 |
G. Hancke and M. Kuhn, "An RFID Distance Bounding Protocol", Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05) pp. 67-73, 2005.
|
3 |
D. Singel'ee and B. Preneel, "Distance Bounding in Noisy Environments", European Workshop on Security in Ad-hoc and Sensor Networks (ESAS'07), Vol. 4572 of LNCS, pp. 101-115, 2007.
|
4 |
Y.-J. Tu and S. Piramuthu, "RFID Distance Bounding Protocols", First International EURASIP Workshop on RFID Technology, 2007.
|
5 |
J. Munilla, A. Ortiz, and A. Peinado, "Distance Bounding Protocols with Void-Challenges for RFID", Workshop on RFID Security(RFIDSec'06), 2006.
|
6 |
J. Munilla and A. Peinado. "Distance bounding protocols for RFID enhanced by using voidchallenges and analysis in noisy channels", Wireless Communications and Mobile Computing, Vol. 8, No. 9, pp. 1227-1232, 2008.
DOI
|
7 |
A. O. Gurel, A. Arslan, and M. Akgun, "Nonuniform stepping approach to RFID distance bounding problem", 5th International Workshop on Data Privacy Management(DPM'10), Vol. 6370 of LNCS, 2010.
|
8 |
M. R. S. Abyaneh, "Security analysis of two distance-bounding protocols", RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy, pp. 94-107, 2011.
|
9 |
C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks", http://eprint.iacr.org/2009/310, 2009.
|
10 |
P. Peris-Lopez, J. C. Hernandez- Castro, J. M. Estevez-Tapiador, and J. C. A. vander Lubbe. "Shedding Light on RFID Distance Bounding Protocols and Terrorist Attacks", arXiv.org, Computer Science, Cryptography and Security, 2010.
|
11 |
V. Nikov and M. Vauclair, "Yet another secure Distance-bounding Protocol", http://eprint.iacr.org/ 2008/319, 2008.
|