共 50 条
- [1] Security Analysis of Two Distance-Bounding Protocols RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
- [3] Security Analysis of Two Distance-Bounding Protocols RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
- [5] On Selecting the Nonce Length in Distance-Bounding Protocols COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
- [6] A Class of Precomputation-based Distance-bounding Protocols 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 97 - 111
- [7] Security Implications of Implementing Multistate Distance-Bounding Protocols CPS-SPC'19: PROCEEDINGS OF THE ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2019, : 99 - 108
- [8] Embedding distance-bounding protocols within intuitive interactions SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 143 - 156
- [9] Distance-Bounding Protocols: Verification without Time and Location 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 549 - 566