{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:44:34Z","timestamp":1742917474762,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252426"},{"type":"electronic","value":"9783642252433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25243-3_7","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T10:18:58Z","timestamp":1320229138000},"page":"78-92","source":"Crossref","is-referenced-by-count":9,"title":["A Note on a Privacy-Preserving Distance-Bounding Protocol"],"prefix":"10.1007","author":[{"given":"Jean-Philippe","family":"Aumasson","sequence":"first","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Peris-Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/MCOM.2008.4473095","volume":"46","author":"P. Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., Poturalski, M., Schaller, P., Lafourcade, P., Basin, D., \u010capkun, S., Hubaux, J.P.: Secure neighborhood discovery: a fundamental element for mobile ad hoc networking. IEEE Communications Magazine\u00a046(2), 132\u2013139 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security (WiSe 2003), pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"key":"7_CR3","unstructured":"BroadcastEngineering: TV GLOBO TVDR, Article available online at http:\/\/broadcastengineering.com\/excellence-awards\/tv-globo-tdvr\/ (accessed January 11, 2011)"},{"key":"7_CR4","unstructured":"Francillion, A., Danev, B., \u010capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Cryptology ePrint Archive: Report 2010\/332 (2010) (to appear in proceedings of NDSS 2011)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SECURECOMM 2005), pp. 67\u201373 (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"7_CR7","unstructured":"Tu, Y.J., Piramuthu, S.: RFID Distance Bounding Protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (2007)"},{"issue":"9","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing\u00a08(9), 1227\u20131232 (2008)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J.Y., Scholtz, R.A.: Ranging in a dense multipath environment using an UWB radio link. IEEE Journal on Selected Areas in Communications\u00a020(9) (2002)","DOI":"10.1109\/JSAC.2002.805060"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MSP.2005.1458289","volume":"22","author":"S. Gezici","year":"2005","unstructured":"Gezici, S., Tian, Z., Biannakis, G.B., Kobayashi, H., Molisch, A.F., Poor, V., Sahinoglu, Z.: Localization via ultra-wideband radius: a look at positioning aspects for future sensor networks. IEEE Signal Processing Magazine\u00a022(4), 70\u201384 (2005)","journal-title":"IEEE Signal Processing Magazine"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kuhn, M., Luecken, H., Tippenhauer, N.O.: UWB impulse radio based distance bounding. In: Proceedings of the 7th Workshop on Positioning, Navigation and Communication 2010, WPNC 2010 (2010)","DOI":"10.1109\/WPNC.2010.5653801"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Butty\u00e1n, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), pp. 21\u201332 (2003)","DOI":"10.1145\/986858.986862"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2005), pp. 834\u2013840 (2005)","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, pp. 83\u201397 (2006)","DOI":"10.1007\/11964254_9"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Meadows, C., Syverson, P., Chang, L.: Towards more efficient distance bounding protocols for use in sensor networks. In: Proceedings of the International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), pp. 1\u20135 (2006)","DOI":"10.1109\/SECCOMW.2006.359532"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA, pp. 1917\u20131928 (2005)","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), San Francisco, CA, USA, vol.\u00a03, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., \u010capkun, S.: Location privacy of distance bounding protocols. In: Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS 2008), pp. 149\u2013160 (2008)","DOI":"10.1145\/1455770.1455791"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-642-04474-8_33","volume-title":"Information Security","author":"E. Zenner","year":"2009","unstructured":"Zenner, E.: Nonce Generators and the Nonce Reset Problem. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 411\u2013426. Springer, Heidelberg (2009)"},{"key":"7_CR21","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn. Wiley (2008)"},{"issue":"10","key":"7_CR22","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Communications of the ACM\u00a020(10), 762\u2013772 (1977)","journal-title":"Communications of the ACM"},{"key":"7_CR23","unstructured":"Bernstein, D.J.: Better price-performance rations for generalized birthday attacks. In: Proceedings of the International Conference on Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS 2007 (2007)"},{"key":"7_CR24","unstructured":"Schimmler, M.: Fast sorting on the instruction systolic array. Technical Report 8709, Christian-Albrechts Universit\u00e4t Kiel (1987)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P., Shamir, A.: An optimal sorting algorithm for mesh connected computers. In: Proceedings of the 18th Annual ACM Symposium on Theory of Computing (STOC 1986), pp. 255\u2013263 (1986)","DOI":"10.1145\/12130.12156"},{"key":"7_CR26","unstructured":"Percival, C.: Encrypt-then-MAC. Blog entry on Daemonic Dispatches, http:\/\/www.daemonology.net\/blog\/2009-06-24-encrypt-then-mac.html (accessed January 11, 2011)"},{"issue":"9","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing\u00a08(9), 1227\u20131232 (2008)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: Security and Privacy in the Age of Ubiquitous Computing. IFIP AICT, pp. 223\u2013238 (2005)","DOI":"10.1007\/0-387-25660-1_15"},{"key":"7_CR29","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1229285.1229314","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007)","author":"J. Reid","year":"2007","unstructured":"Reid, J., Gonzalez Nieto, J.M., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 204\u2013213. ACM, Singapore (2007)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25243-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T15:41:22Z","timestamp":1741880482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25243-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252426","9783642252433"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25243-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}