共 50 条
- [21] Image authentication with a time-stamped signature of the image and secret key encryption ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 91 - 98
- [25] Practical and Provably Secure Distance-Bounding INFORMATION SECURITY (ISC 2013), 2015, 7807 : 248 - 258
- [27] Mechanised Models and Proofs for Distance-Bounding 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 591 - 606
- [28] A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 121 - 133
- [29] Distance-bounding trust protocol in anonymous radio-frequency identification systems CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (16): : 4211 - 4229
- [30] A New Secure Authentication Based Distance Bounding Protocol PeerJ Computer Science, 2021, 7 : 1 - 28