共 50 条
- [41] Distance Bounding Protocol for Multiple RFID Tag Authentication EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120
- [42] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302
- [44] Key establishment using secure distance bounding protocols 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
- [45] A Formal Approach to Distance-Bounding RFID Protocols INFORMATION SECURITY, 2011, 7001 : 47 - +
- [46] Optimal Security Limits of RFID Distance Bounding Protocols RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
- [47] On Selecting the Nonce Length in Distance-Bounding Protocols COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227
- [48] Distance Bounding Protocols on TH-UWB Radios 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
- [50] Lightweight Distance Bounding Protocol against Relay Attacks IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (04): : 1155 - 1158