共 50 条
[4]
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
[J].
CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS,
2009, 5888
:443-+
[5]
RFID Distance Bounding Multistate Enhancement
[J].
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS,
2009, 5922
:290-+
[6]
Mechanised Models and Proofs for Distance-Bounding
[J].
2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021),
2021,
:591-606
[7]
Post-Collusion Security and Distance Bounding
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:941-958
[8]
Distance Hijacking Attacks on Distance Bounding Protocols
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:113-127
[9]
A Mafia and Distance Fraud High-Resistance RFID Distance Bounding Protocol
[J].
2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC),
2014,
:67-72
[10]
Distance Bounding with Delayed Responses
[J].
IEEE COMMUNICATIONS LETTERS,
2012, 16 (09)
:1478-1481