{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:44:00Z","timestamp":1725727440495},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386305"},{"type":"electronic","value":"9783642386312"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38631-2_33","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T00:37:49Z","timestamp":1369615069000},"page":"451-464","source":"Crossref","is-referenced-by-count":9,"title":["A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation"],"prefix":"10.1007","author":[{"given":"Yunhui","family":"Zhuang","sequence":"first","affiliation":[]},{"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT 1993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"33_CR2","unstructured":"Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: SecureComm 2005, pp. 67\u201373. IEEE Computer Society (2005)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"33_CR4","unstructured":"Desmedt, Y.: Major security problems with the \u2018unforgeable\u2019 (Feige)- Fiat- Shamir proofs of identify and how to overcome them. In: SecuriCom 1988, pp. 15\u201317 (1988)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Marin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: ACM Wisec 2011, pp. 145\u2013156. ACM SIGSAC (2011)","DOI":"10.1145\/1998412.1998437"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Cremers, C., Rasmussen, K.B., \u010capkun, S.: Distance Hijacking Attacks on Distance Bounding Protocols. In: IEEE S&P 2012, pp. 113\u2013127 (2012)","DOI":"10.1109\/SP.2012.17"},{"issue":"9","key":"33_CR7","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance Bounding Protocols for RFID Enhanced by Using Void-challenges and Analysis in Noisy Channels. Wireless Communications & Mobile Computing\u00a08(9), 1227\u20131232 (2008)","journal-title":"Wireless Communications & Mobile Computing"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-25286-0_6","volume-title":"RFID. Security and Privacy","author":"S. Karda\u015f","year":"2012","unstructured":"Karda\u015f, S., Kiraz, M.S., Bing\u00f6l, M.A., Demirci, H.: A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 78\u201393. Springer, Heidelberg (2012)"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G. Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An Efficient Distance Bounding RFID\u00a0Authentication\u00a0Protocol: Balancing False-Acceptance Rate and Memory Requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"key":"33_CR10","unstructured":"Tu, Y.J., Piramuthu, S.: RFID Distance Bounding Protocols. In: EURASIP Workshop in RFID Technology, Vienna, Austria (2007)"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume-title":"Cryptology and Network Security","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 119\u2013133. Springer, Heidelberg (2009)"},{"key":"33_CR12","unstructured":"Chae, H.J., Yeager, D.J., Smith, J.R., Fu, K.: Maximalist Cryptography and Computation on the WISP UHF RFID Tag. In: RFIDSec (2007)"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-85893-5_12","volume-title":"Smart Card Research and Advanced Applications","author":"G. Hofferek","year":"2008","unstructured":"Hofferek, G., Wolkerstorfer, J.: Coupon Recalculation for the GPS Authentication Scheme. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 162\u2013175. Springer, Heidelberg (2008)"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"D. Singel\u00e9e","year":"2007","unstructured":"Singel\u00e9e, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 101\u2013115. Springer, Heidelberg (2007)"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-34129-8_25","volume-title":"Information and Communications Security","author":"A. Yang","year":"2012","unstructured":"Yang, A., Zhuang, Y., Wong, D.S.: An Efficient Single-Slow-Phase Mutually Authenticated RFID Ddistance Bounding Protocol with Tag Privacy. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol.\u00a07618, pp. 285\u2013292. Springer, Heidelberg (2012)"},{"key":"33_CR16","unstructured":"Nikov, V., Vauclair, M.: Yet Another Secure Distacne-Bounding Protocol. IACR ePrint Archive, \n                      \n                        http:\/\/eprint.iacr.org\/2008\/319\n                      \n                      \n                     and SECRYPT 2008"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., \u010capkun, S.: Location Privacy of Distance Bounding Protocols. In: ACM CCS 2008, pp. 149\u2013160. ACM SIGSAC (2008)","DOI":"10.1145\/1455770.1455791"},{"key":"33_CR18","unstructured":"Fischlin, M., Onete, C.: Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. In: IACR ePrint Archive (2012), \n                      \n                        http:\/\/eprint.iacr.org\/2012\/128"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38631-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T03:22:56Z","timestamp":1557717776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38631-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386305","9783642386312"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38631-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}