共 50 条
- [1] Distance Hijacking Attacks on Distance Bounding Protocols 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
- [2] On Modeling Terrorist Frauds Addressing Collusion in Distance Bounding Protocols PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 1 - 20
- [4] Modelling and Analysis of a Hierarchy of Distance Bounding Attacks PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1563 - 1580
- [6] Detecting collusion attacks in security protocols FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
- [7] Post-Collusion Security and Distance Bounding PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 941 - 958
- [9] Security Analysis of Two Distance-Bounding Protocols RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
- [10] Group Distance Bounding Protocols TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 302 - 312