共 50 条
- [12] Security Analysis of Two Distance-Bounding Protocols RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
- [13] Analysis of Authentication Protocols Based on Rubin Logic 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4680 - +
- [14] A bound on attacks on authentication protocols FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
- [15] Validating attacks on authentication protocols 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
- [16] Errors in attacks on authentication protocols ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
- [18] Towards Quantum Distance Bounding Protocols RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 151 - 162
- [19] Survey of Distance Bounding Protocols and Threats FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
- [20] Location Privacy of Distance Bounding Protocols CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159