{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:50:02Z","timestamp":1760622602548},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387327211"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-46276-9_12","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T07:27:34Z","timestamp":1196494054000},"page":"279-298","source":"Crossref","is-referenced-by-count":34,"title":["Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks"],"prefix":"10.1007","author":[{"given":"Catherine","family":"Meadows","sequence":"first","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]},{"given":"Dusko","family":"Pavlovic","sequence":"additional","affiliation":[]},{"given":"LiWu","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"MSSI Completes Phase II SBIR Contract for UWB-Based Urban Positioning System (\u2018UPS\u2019)-Awarded $1M Phase II Plus, June 27 2006."},{"key":"12_CR2","unstructured":"S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology-Eurocrypt\u2019 93. LNCS 765, Springer-Verlag, 1995."},{"key":"12_CR3","unstructured":"L. Bussard. Trust Establishment Protocols for Communicating Devices. PhD thesis, ESNT Paris, October 2004."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Iliano Cervesato, Catherine Meadows, and Dusko Pavlovic. An encapsulated authentication logic for reasoning about key distribution protocols. In Joshua Guttman, editor, Proceedings of CSFW 2005, pages 48\u201361. IEEE, 2005.","DOI":"10.1109\/CSFW.2005.7"},{"key":"12_CR5","unstructured":"Y. Desmedt. Major security problems with the \u2018unforgeable\u2019 Feige-Shamir proofs of identity and how to overcome them. In Proceedings of Securicom\u2019 88, 1988."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"G. Hancke and M. Kuhn. An RFID distance bounding protocol. In Proc. of Securecomm 2005, 2005.","DOI":"10.1109\/SECURECOMM.2005.56"},{"issue":"7","key":"12_CR7","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L. Lamport","year":"1978","unstructured":"Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558\u2013565, 1978.","journal-title":"Commun. ACM"},{"key":"12_CR8","unstructured":"L. Lazos, S. \u010capkun, and R. Poovendran. ROPE: Robust position estimation in wireless sensor networs. In The Fourth International Conference on Information Processing in Sensor Networks (ISPN\u2019 05), April 2005."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"L. Lazos and R. Poovendran. SerLoc: Robust localization for wireless sensor network protocols. ACM Transactions on Sensor Networks, 2005.","DOI":"10.1145\/1077391.1077395"},{"issue":"2","key":"12_CR10","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/JSAC.2005.861381","volume":"24","author":"L. Lazos","year":"2006","unstructured":"Loukas Lazos and Radha Poovendran. HiRLoc: Hi-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communication, 24(2):993\u2013999, February 2006.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Catherine Meadows and Dusko Pavlovic. Deriving, attacking and defending the GDOI protocol. In Peter Ryan, Pierangela Samarati, Dieter Gollmann, and Refik Molva, editors, Proc. ESORICS 2004, volume 3193 of Lecture Notes in Computer Science, pages 53\u201372. Springer Verlag, 2004.","DOI":"10.1007\/978-3-540-30108-0_4"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Catherine Meadows, Paul Syverson, and LiWu Chang. Towards more efficient distance bounding protocols. In SecureComm 2006, August 2006.","DOI":"10.1109\/SECCOMW.2006.359532"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Dusko Pavlovic and Catherine Meadows. Deriving secrecy properties in key establishment protocols. In Dieter Gollmann and Andrei Sabelfeld, editors, Proceedings of ESORICS 2006, Lecture Notes in Computer Science. Springer Verlag, 2006. to appear.","DOI":"10.1007\/11863908_24"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In ACM Workshop on Wireless Security (WiSe 2003), pages 48\u201361. ACM, September 19 2003.","DOI":"10.1145\/941311.941313"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"D. Single\u00e9 and B. Preneel. Location verification using secure distance bounding protocols. In International Workshop on Wireless and Sensor Network Security. IEEE Computer Society Press, 2005.","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"S. \u010capkun and J. P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communication, 24(2), February 2006.","DOI":"10.1109\/JSAC.2005.861380"},{"key":"12_CR17","unstructured":"B. Waters and E. Felten. Secure, private proofs of location. Technical Report TR-667-03, Princeton, 2003."}],"container-title":["Advances in Information Security","Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-46276-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T22:09:16Z","timestamp":1619561356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-46276-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387327211"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-46276-9_12","relation":{},"subject":[]}}