{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:59:24Z","timestamp":1743083964386,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389795"},{"type":"electronic","value":"9783642389801"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38980-1_26","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T18:26:48Z","timestamp":1371752808000},"page":"414-431","source":"Crossref","is-referenced-by-count":31,"title":["Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance"],"prefix":"10.1007","author":[{"given":"Marc","family":"Fischlin","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Avoine, G., Bingol, M.A., Karda, S., Lauradoux, C., Martin, B.: A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security (2010)","DOI":"10.3233\/JCS-2010-0408"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, B.: How secret-sharing can defeat terrorist fraud. In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, pp. 145\u2013156. ACM Press (2011)","DOI":"10.1145\/1998412.1998437"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"26_CR4","first-page":"15","volume-title":"SecuriCom","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Major security problems with the \u2018unforgeable\u2019 (feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, pp. 15\u201317. SEDEP Paris, France (1988)"},{"key":"26_CR5","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proc. of the 16th USENIX Security Symposium on USENIX Security Symposium, article no. 7. ACM Press (2007)"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-24861-0_4","volume-title":"Information Security","author":"U. D\u00fcrholz","year":"2011","unstructured":"D\u00fcrholz, U., Fischlin, M., Kasper, M., Onete, C.: A formal approach to distance-bounding RFID protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol.\u00a07001, pp. 47\u201362. Springer, Heidelberg (2011)"},{"key":"26_CR7","unstructured":"Fischlin, M., Onete, C.: Provably secure distance-bounding: an analysis of prominent protocols. Accepted at the 6th Conference on Security and Privacy in Wireless and Mobile Networks ACM WISec 2013, Proceedings will follow (2013), \n                    \n                      http:\/\/eprint.iacr.org\/2012\/128.pdf"},{"key":"26_CR8","unstructured":"Francillon, A., Danev, B., \u010capkun, S.: Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (2010), \n                    \n                      http:\/\/eprint.iacr.org\/2010\/332"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TWC.2010.01.090935","volume":"9","author":"K. Haataja","year":"2010","unstructured":"Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Transactions on Wireless Communications\u00a09(1), 384\u2013392 (2010)","journal-title":"Transactions on Wireless Communications"},{"key":"26_CR10","unstructured":"Hancke, G.P.: A practical relay attack on ISO 14443 proximity cards (2005), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/gh275\/relay.pdf"},{"key":"26_CR11","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM, pp. 67\u201373. ACM Press (2005)"},{"key":"26_CR12","unstructured":"Hlav\u00e1\u010d, M., Tom\u00e1\u010d, R.: A Note on the Relay Attacks on e-Passports (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2007\/244.pdf"},{"key":"26_CR13","unstructured":"Kfir, Z., Wool, A.: Picking virtual pockets using relay attacks on contactless smartcard systems. In: Conference on Security and Privacy for Emergency Areas in Communication Networks \u2013 SecureComm 2005, pp. 47\u201358. IEEE (2005)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-30182-0_29","volume-title":"Computer and Information Sciences - ISCIS 2004","author":"A. Levi","year":"2004","unstructured":"Levi, A., \u00c7etinta\u015f, E., Aydos, M., Ko\u00e7, \u00c7.K., \u00c7a\u011flayan, M.U.: Relay attacks on bluetooth authentication and solutions. In: Aykanat, C., Dayar, T., K\u00f6rpeo\u011flu, \u0130. (eds.) ISCIS 2004. LNCS, vol.\u00a03280, pp. 278\u2013288. Springer, Heidelberg (2004)"},{"key":"26_CR16","unstructured":"Oren, Y., Wool, A.: Relay attacks on RFID-based electronic voting systems. Cryptology ePrint Archive, Report 2009\/442 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/2009\/422.pdf"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-642-33167-1_24","volume-title":"Computer Security \u2013 ESORICS 2012","author":"A. Ranganathan","year":"2012","unstructured":"Ranganathan, A., Tippenhauer, N.O., \u0160kori\u0107, B., Singel\u00e9e, D., \u010capkun, S.: Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 415\u2013432. Springer, Heidelberg (2012)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS, pp. 204\u2013213. ACM Press (2007)","DOI":"10.1145\/1229285.1229314"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38980-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:34:20Z","timestamp":1558301660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38980-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389795","9783642389801"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38980-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}