共 34 条
[1]
[Anonymous], 2012, ELEMENTS INFORM THEO
[2]
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[3]
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[4]
Survey of Distance Bounding Protocols and Threats
[J].
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015),
2016, 9482
:29-49
[6]
Capkun S, 2005, IEEE INFOCOM SER, P1917
[8]
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[9]
Danev B., 2011, P NETW DISTR SYST SE
[10]
Flury M, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P117