共 50 条
- [21] Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1343 - 1359
- [22] Secure Distance Bounding Protocol on TH-UWB 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 5 - 9
- [23] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 289 - 302
- [24] Security Analysis of Two Distance-Bounding Protocols RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
- [26] Security Analysis of Two Distance-Bounding Protocols RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
- [27] Key establishment using secure distance bounding protocols 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
- [28] A Formal Approach to Distance-Bounding RFID Protocols INFORMATION SECURITY, 2011, 7001 : 47 - +
- [29] Optimal Security Limits of RFID Distance Bounding Protocols RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 220 - +
- [30] On Selecting the Nonce Length in Distance-Bounding Protocols COMPUTER JOURNAL, 2013, 56 (10): : 1216 - 1227