{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:31Z","timestamp":1759133911176},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_19","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:56:19Z","timestamp":1288691779000},"page":"239-257","source":"Crossref","is-referenced-by-count":26,"title":["The Poulidor Distance-Bounding Protocol"],"prefix":"10.1007","author":[{"given":"Rolando","family":"Trujillo-Rasua","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Gildas","family":"Avoine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"ISO\/IEC 11770: Information technology \u2013 security techniques \u2013 key management"},{"key":"19_CR2","unstructured":"ISO\/IEC 9798: Information technology \u2013 security techniques \u2013 entity authentication"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G. Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the fiat-shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 21\u201339. Springer, Heidelberg (1988)"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/SECURECOMM.2005.56","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005","author":"G. Hancke","year":"2005","unstructured":"Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005, Athens, Greece, pp. 67\u201373. IEEE Computer Society Press, Los Alamitos (September 2005)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume-title":"Cryptology and Network Security","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 119\u2013133. Springer, Heidelberg (2009)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"19_CR9","unstructured":"Munilla, J., Ortiz, A., Peinado, A.: Distance Bounding Protocols with Void-Challenges for RFID. In: Workshop on RFID Security, RFIDSec 2006, Graz, Austria (July 2006) Ecrypt"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/NTMS.2008.ECP.88","volume-title":"New Technologies, Mobility and Security, NTMS 2008","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Security Analysis of Tu and Piramuthu\u2019s Protocol. In: New Technologies, Mobility and Security, NTMS 2008, Tangier, Morocco, pp. 1\u20135. IEEE Computer Society Press, Los Alamitos (November 2008)"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1229285.1229314","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007","author":"J. Reid","year":"2007","unstructured":"Reid, J., Neito, J.G., Tang, T., Senadji, B.: Detecting relay attacks with timing based protocols. In: Bao, F., Miller, S. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Republic of Singapore, pp. 204\u2013213. ACM Press, New York (March 2007)"},{"key":"19_CR12","unstructured":"Tu, Y.-J., Piramuthu, S.: RFID Distance Bounding Protocols. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria (September 2007)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:31:47Z","timestamp":1619771507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}