{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:14:46Z","timestamp":1763201686754},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248603"},{"type":"electronic","value":"9783642248610"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24861-0_4","type":"book-chapter","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T01:18:10Z","timestamp":1318382290000},"page":"47-62","source":"Crossref","is-referenced-by-count":35,"title":["A Formal Approach to Distance-Bounding RFID Protocols"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"D\u00fcrholz","sequence":"first","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kasper","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of RFIDSec 2011","author":"M.R.S. Abyneh","year":"2011","unstructured":"Abyneh, M.R.S.: Security analysis of two distance-bounding protocols. In: Proceedings of RFIDSec 2011. LNCS. Springer, Heidelberg (2011)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Avoine, G., Bingol, M.A., Karda, S., Lauradoux, C., Martin, B.: A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security (2010)","DOI":"10.3233\/JCS-2010-0408"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-16822-2_18","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"O. Kara","year":"2010","unstructured":"Kara, O., Karda\u015f, S., Bing\u00f6l, M.A., Avoine, G.: Optimal security limits of RFID distance bounding protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 220\u2013238. Springer, Heidelberg (2010)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G. Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID\u00a0authentication\u00a0protocol: Balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"key":"4_CR5","unstructured":"Bellare, M., Goldreich, O.: Proving computational ability (1992), http:\/\/www.wisdom.weizmann.ac.il\/~oded\/PS\/poa.ps"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"issue":"9","key":"4_CR9","doi-asserted-by":"publisher","first-page":"4339","DOI":"10.1109\/TIT.2008.928290","volume":"54","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H.: Trusted-hb: A low-cost version of hb \u2009+\u2009 secure against man-in-the-middle attacks. Transactions on Information Theory\u00a054(9), 4339\u20134342 (2008)","journal-title":"Transactions on Information Theory"},{"key":"4_CR10","first-page":"222","volume":"181","author":"L. Bussard","year":"2005","unstructured":"Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. Security and Privacy in the Age of Ubiquitous Computing\u00a0181, 222\u2013238 (2005)","journal-title":"Security and Privacy in the Age of Ubiquitous Computing"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/986858.986862","volume-title":"ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN","author":"S. Capkun","year":"2003","unstructured":"Capkun, S., Butty\u2019an, L., Hubaux, J.P.: Sector: Secure tracking of node encounters in multi-hop wireless networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN, pp. 21\u201332. ACM Press, New York (2003)"},{"key":"4_CR13","unstructured":"Carluccio, D., Kasper, T., Paar, C.: Implementation details of a multi purpose ISO 14443 RFIDtool. Printed handout of Workshop on RFID Security - RFIDSec 2006 (July 2006)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-03356-8_23","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N. Chandran","year":"2009","unstructured":"Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 391\u2013407. Springer, Heidelberg (2009)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11964254_9","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"J. Clulow","year":"2006","unstructured":"Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.\u00a04357, pp. 83\u201397. Springer, Heidelberg (2006)"},{"key":"4_CR16","first-page":"15","volume-title":"SecuriCom","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Major security problems with the \u2019unforgeable\u2019 (feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, pp. 15\u201317. SEDEP, Paris (1988)"},{"key":"4_CR17","volume-title":"Proc. of the 16-th USENIX Security Symposium on USENIX Security Symposium, article no. 7.","author":"S. Drimer","year":"2007","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proc. of the 16-th USENIX Security Symposium on USENIX Security Symposium, article no. 7. ACM Press, New York (2007)"},{"key":"4_CR18","unstructured":"Duc, D., Kim, K.: Securing HB+ against GRS man-in-the-middle attack. In: Symposium on Cryptography and Information Security (SCIS). The Institute of Electronics, Information and Communication Engineers (2007)"},{"key":"4_CR19","unstructured":"Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. Cryptology ePrint Archive, Report 2010\/332 (2010), ePRINTURL"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An active attack against hb+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005\/237 (2005), ePRINTURL","DOI":"10.1049\/el:20052622"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BFb0055726","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"O. Goldreich","year":"1998","unstructured":"Goldreich, O., Pfitzmann, B., Rivest, R.L.: Self-delegation with controlled propagation - or - what if you lose your laptop. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 153\u2013168. Springer, Heidelberg (1998)"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TWC.2010.01.090935","volume":"9","author":"K. Haataja","year":"2010","unstructured":"Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Transactions on Wireless Communications\u00a09(1), 384\u2013392 (2010)","journal-title":"Transactions on Wireless Communications"},{"key":"4_CR23","unstructured":"Hancke, G.P.: A practical relay attack on ISO 14443 proximity cards (2005), http:\/\/www.cl.cam.ac.uk\/gh275\/relay.pdf"},{"key":"4_CR24","unstructured":"Hancke, G.: Distance bounding publication database (2010), http:\/\/www.rfidblog.org.uk\/db.html"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: Design of a secure distance-bounding channel for RFID. Journal of Network and Computer Applications (2010)","DOI":"10.1016\/j.jnca.2010.04.014"},{"key":"4_CR26","first-page":"67","volume-title":"SECURECOMM","author":"G.P. Hancke","year":"2005","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM, pp. 67\u201373. ACM Press, New York (2005)"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"issue":"2","key":"4_CR28","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume-title":"Cryptology and Network Security","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 119\u2013133. Springer, Heidelberg (2009)"},{"key":"4_CR30","first-page":"118","volume-title":"International Conference on RFID","author":"X. Leng","year":"2008","unstructured":"Leng, X., Mayes, K., Markantonakis, K.: HB-MP+ protocol: An improvement on the HB-MP protocol. In: International Conference on RFID, pp. 118\u2013124. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"4_CR31","volume-title":"Proceedings of Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks","author":"C. Meadows","year":"2007","unstructured":"Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: Distance bounding protocols: Authentication logic analysis and collusion attacks. In: Proceedings of Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer, Heidelberg (2007)"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Overbeck, R., Vaudenay, S.: On the security of hb# against a man-in-the-middle attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 108\u2013124. Springer, Heidelberg (2008)"},{"key":"4_CR33","unstructured":"Rasmussen, K.B., \u010capkun, S.: Realization of RF distance bounding. In: USENIX Security Symposium (2010)"},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1229285.1229314","volume-title":"ASIACCS","author":"J. Reid","year":"2007","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS, pp. 204\u2013213. ACM Press, New York (2007)"},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/CSF.2009.6","volume-title":"Proceedings of the 22nd IEEE Computer Security Foundations Symposium 2009","author":"P. Schaller","year":"2009","unstructured":"Schaller, P., Schmidt, B., Basin, D., Capkun, S.: Modeling and verifying physical properties of security protocols for wireless networks. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium 2009, pp. 109\u2013123. ACM, New York (2009)"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"D. Singel\u00e9e","year":"2007","unstructured":"Singel\u00e9e, D., Preneel, B.: Distance bounding in noisy environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 101\u2013115. Springer, Heidelberg (2007)"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-16822-2_19","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"R. Trujillo-Rasua","year":"2010","unstructured":"Trujillo-Rasua, R., Martin, B., Avoine, G.: The poulidor distance-bounding protocol. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 239\u2013257. Springer, Heidelberg (2010)"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-46885-4_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"M. Yung","year":"1990","unstructured":"Yung, M.: Zero-knowledge proofs of computational power. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 196\u2013207. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24861-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T10:07:30Z","timestamp":1560766050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24861-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248603","9783642248610"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24861-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}