{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:19:40Z","timestamp":1763201980074,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312705"},{"type":"electronic","value":"9783319312712"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_13","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:33:58Z","timestamp":1457530438000},"page":"209-224","source":"Crossref","is-referenced-by-count":2,"title":["The Not-so-Distant Future: Distance-Bounding Protocols on Smartphones"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Gambs","sequence":"first","affiliation":[]},{"given":"Carlos Eduardo Rosar K\u00f3s","family":"Lassance","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID\u00a0authentication\u00a0protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"13_CR3","unstructured":"Carluccio, D., Kasper, T., Paar, C.: Implementation details of a multi purpose ISO 14443 rfidtool. In: Printed handout of RFIDSec 06 (2006)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11964254_9","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"J Clulow","year":"2006","unstructured":"Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: distance-bounding attacks in wireless networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83\u201397. Springer, Heidelberg (2006)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"YG Desmedt","year":"1988","unstructured":"Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol (extended abstract). In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21\u201339. Springer, Heidelberg (1988)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Fischlin, M., Onete, C.: Subtle kinks in distance bounding: an analysis of prominent protocols. In: Proceedings of WiSec 2013, pp. 195\u2013206. ACM (2013)","DOI":"10.1145\/2462096.2462128"},{"key":"13_CR7","unstructured":"Francillon, A., Danev, B., \u010capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of NDSS 2011 (2011)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical relay attack oncontactless transactions by using NFC mobile phones. In: Proceedings of RFID-Sec 2010, pp. 35\u201349 (2010)","DOI":"10.1007\/978-3-642-16822-2_4"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TWC.2010.01.090935","volume":"9","author":"K Haataja","year":"2010","unstructured":"Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Trans. Wirel. Commun. 9(1), 384\u2013392 (2010)","journal-title":"Trans. Wirel. Commun."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: Proceedings of SECURECOMM 2005, pp. 67\u201373. IEEE Computer Society (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"13_CR11","unstructured":"Hancke, G.P.: A practical relay attack on ISO 14443 proximity cards. http:\/\/www.rfidblog.org.uk\/hancke-rfidrelay.pdf . Accessed 9 January 2015"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Henzl, M., Han\u00e1\u010dek, P., Ka\u010dic, M.: Preventing real-world relay attacks on contactless devices. In: Proceedings of IEEE ICCST 2014, pp. 376\u2013381. IEEE (2014)","DOI":"10.1109\/CCST.2014.6987031"},{"key":"13_CR13","unstructured":"Hlav\u00e1\u010d, M., Tom\u00e1\u010d, R.: A note on the relay attacks on e-passports (2007). http:\/\/eprint.iacr.org\/2007\/244.pdf"},{"key":"13_CR14","unstructured":"ISO\/IEC-14443: Identification cards - contactless integrated circuit(s) cards - proximity cards. Technical report, International Organization for Standardization (2008)"},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Proceedings of ICISC 2008 (2008)","DOI":"10.1007\/978-3-642-00730-9_7"},{"key":"13_CR17","unstructured":"NFC Forum TM: NFC Controller Interface (NCI), version 1.1 edn. (2014)"},{"key":"13_CR18","unstructured":"NFC Forum TM: NFC Digital Protocol, version 1.1 edn. (2014)"},{"key":"13_CR19","unstructured":"Oren, Y., Wool, A.: relay attacks on RFID-based electronic voting systems. Cryptology ePrint Archive, Report 2009\/442 (2009). http:\/\/eprint.iacr.org\/2009\/422.pdf"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-642-33167-1_24","volume-title":"Computer Security \u2013 ESORICS 2012","author":"A Ranganathan","year":"2012","unstructured":"Ranganathan, A., Tippenhauer, N.O., \u0160kori\u0107, B., Singel\u00e9e, D., \u010capkun, S.: Design and implementation of a terrorist fraud resilient distance bounding system. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 415\u2013432. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:11:52Z","timestamp":1748801512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}