共 50 条
- [41] On Selecting the Nonce Length in Distance-Bounding Protocols COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
- [42] Distance Bounding Protocols on TH-UWB Radios 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
- [43] Post-Collusion Security and Distance Bounding PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
- [46] A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 67 - 72
- [47] A Class of Precomputation-based Distance-bounding Protocols 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 97 - 111
- [48] On Modeling Terrorist Frauds Addressing Collusion in Distance Bounding Protocols PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 1 - 20
- [50] Secure Positioning with Non-Ideal Distance Bounding Protocols 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 907 - 912