共 50 条
- [21] Post-Collusion Security and Distance Bounding PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
- [22] RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 119 - 133
- [23] Quantum Distance Bounding PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 233 - 238
- [25] A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 121 - 133
- [26] Distance-bounding proof of knowledge to avoid real-time attacks SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
- [27] Distance-bounding Identification ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
- [29] Novel graph distance measures based on intra-graph clustering and cluster distance 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL, III, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 333 - 338
- [30] Distance bounding in noisy environments SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 101 - +