{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:13:31Z","timestamp":1746245611937,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_19","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T04:22:02Z","timestamp":1400646122000},"page":"300-317","source":"Crossref","is-referenced-by-count":7,"title":["Position-Based Cryptography from Noisy Channels"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Dziembowski","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Zdanowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-22792-9_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"H. Buhrman","year":"2011","unstructured":"Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: Impossibility and constructions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 429\u2013446. Springer, Heidelberg (2011)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1917\u20131928. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-03356-8_23","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N. Chandran","year":"2009","unstructured":"Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 391\u2013407. Springer, Heidelberg (2009)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Review\u00a045(4), 727\u2013784 (2003)","DOI":"10.1137\/S0036144503429856"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Dubhashi, D.P., Panconesi, A.: Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press (2009)","DOI":"10.1017\/CBO9780511581274"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Zdanowicz, M.: Position-Based Cryptography from Noisy Channels. In: ePrint archive (2014)","DOI":"10.1007\/978-3-319-06734-6_19"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Secret key extraction from level crossings over unauthenticated wireless channels. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 201\u2013230. Springer, US (2010)","DOI":"10.1007\/978-1-4419-1385-2_9"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology\u00a05(1) (1992)","DOI":"10.1007\/BF00191321"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Secret key agreement by public discussion from common information. IEEE Transcations on Information Theory\u00a039 (May 1993)","DOI":"10.1109\/18.256484"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security, pp. 1\u201310. ACM (2003)","DOI":"10.1145\/941312.941313"},{"key":"19_CR12","unstructured":"Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 7. IEEE (2005)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:09:30Z","timestamp":1746230970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}