{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:10:39Z","timestamp":1761977439660,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_8","type":"book-chapter","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T00:58:40Z","timestamp":1376960320000},"page":"97-113","source":"Crossref","is-referenced-by-count":33,"title":["Secure and Lightweight Distance-Bounding"],"prefix":"10.1007","author":[{"given":"Ioana","family":"Boureanu","sequence":"first","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-25243-3_7","volume-title":"Information and Communications Security","author":"J.-P. Aumasson","year":"2011","unstructured":"Aumasson, J.-P., Mitrokotsa, A., Peris-Lopez, P.: A Note on a Privacy-Preserving Distance-Bounding Protocol. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol.\u00a07043, pp. 78\u201392. Springer, Heidelberg (2011)"},{"issue":"2","key":"8_CR2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3233\/JCS-2010-0408","volume":"19","author":"G. Avoine","year":"2011","unstructured":"Avoine, G., Bing\u00f6l, M., Kardas, S., Lauradoux, C., Martin, B.: A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security\u00a019(2), 289\u2013317 (2011)","journal-title":"Journal of Computer Security"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: Proceedings of the 4th ACM Conference on Wireless Network Security \u2013 WiSec 2011, Hamburg, Germany. ACM Press (June 2011)","DOI":"10.1145\/1998412.1998437"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-38519-3_23","volume-title":"Information Security and Cryptology","author":"A. Bay","year":"2013","unstructured":"Bay, A., Boureanu, I., Mitrokotsa, A., Spulber, I., Vaudenay, S.: The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol.\u00a07763, pp. 371\u2013391. Springer, Heidelberg (2013)"},{"key":"8_CR5","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Provably Secure Authenticated Distance-Bounding (submitted)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-33481-8_6","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"I. Boureanu","year":"2012","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol.\u00a07533, pp. 100\u2013120. Springer, Heidelberg (2012)"},{"key":"8_CR7","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On secure distance bounding (extended abstract). In: The Early Symmetric Crypto Seminar, ESC 2013, pp. 52\u201360 (2013) ISBN 978-99959-814-0-2"},{"key":"8_CR8","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Towards secure distance bounding. In: The 20th Anniversary Annual Fast Software Encryption, FSE 2013 (to appear, 2013)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-Bounding Protocols (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"8_CR10","unstructured":"Bussard, L., Bagga, W.: Distance-Bounding Proof of Knowledge Protocols to Avoid Terrorist Fraud Attacks. Technical Report RR-04-109, EURECOM (May 2004)"},{"key":"8_CR11","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/0-387-25660-1_15","volume-title":"Security and Privacy in the Age of Ubiquitous Computing","author":"L. Bussard","year":"2005","unstructured":"Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Security and Privacy in the Age of Ubiquitous Computing. IFIP AICT, vol.\u00a0181, pp. 223\u2013238. Springer, Boston (2005)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Butty\u00e1n, L., Hubaux, J.-P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN, pp. 21\u201332. ACM (2003)","DOI":"10.1145\/986858.986862"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Cremers, C., Rasmussen, K.B., \u010capkun, S.: Distance hijacking attacks on distance bounding protocols. In: IEEE Symposium on Security and Privacy, pp. 113\u2013127 (2012)","DOI":"10.1109\/SP.2012.17"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C., Mitrokotsa, A., Vaudenay, S.: Expected Loss Bounds for Authentication in Constrained Channels. In: Proceedings of INFOCOM 2012, Orlando, FL, USA, March 2012, pp. 478\u201385. IEEE press (March 2012)","DOI":"10.1109\/INFCOM.2012.6195788"},{"key":"8_CR15","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of 16th USENIX Security Symposium, Berkeley, CA, USA, pp. 7:1\u20137:16. USENIX Association (2007)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-24861-0_4","volume-title":"Information Security","author":"U. D\u00fcrholz","year":"2011","unstructured":"D\u00fcrholz, U., Fischlin, M., Kasper, M., Onete, C.: A Formal Approach to Distance-Bounding RFID Protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol.\u00a07001, pp. 47\u201362. Springer, Heidelberg (2011)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Fischlin, M., Onete, C.: Subtle kinks in distance-bounding: an analysis of prominent protocols. In: WISEC, pp. 195\u2013206 (2013)","DOI":"10.1145\/2462096.2462128"},{"key":"8_CR18","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2006","unstructured":"Goldreich, O.: Foundations of Cryptography, vol.\u00a01. Cambridge University Press, New York (2006)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-19348-4_6","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"A. \u00d6zhan G\u00fcrel","year":"2011","unstructured":"\u00d6zhan G\u00fcrel, A., Arslan, A., Akg\u00fcn, M.: Non-uniform Stepping Approach to RFID Distance Bounding Problem. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol.\u00a06514, pp. 64\u201378. Springer, Heidelberg (2011)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: Distance-bounding for RFID: Effectiveness of \u2018terrorist fraud\u2019 in the presence of bit errors. In: RFID-TA, pp. 91\u201396 (2012)","DOI":"10.1109\/RFID-TA.2012.6404574"},{"key":"8_CR21","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: SECURECOMM, pp. 67\u201373. ACM (2005)"},{"issue":"301","key":"8_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W. Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association\u00a058(301), 13\u201330 (1963)","journal-title":"Journal of the American Statistical Association"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Kapoor, G., Zhou, W., Piramuthu, S.: Distance Bounding Protocol for Multiple RFID Tag Authentication. In: Xu, C.-Z., Guo, M. (eds.) Proceedings of the 2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, China, vol.\u00a002, pp. 115\u2013120. IEEE Computer Society (December 2008)","DOI":"10.1109\/EUC.2008.48"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume-title":"Cryptology and Network Security","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 119\u2013133. Springer, Heidelberg (2009)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"issue":"2","key":"8_CR26","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/LCOMM.2010.02.091946","volume":"14","author":"A. Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P., Hernandez-Castro, J.C.: Reid et al.\u2019s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels. IEEE Communications Letters\u00a014(2), 121\u2013123 (2010)","journal-title":"IEEE Communications Letters"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Onete, C., Vaudenay, S.: Mafia Fraud Attack against the R\u010c Distance-Bounding Protocol. In: Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A), Nice, France, pp. 74\u201379. IEEE Press (November 2012)","DOI":"10.1109\/RFID-TA.2012.6404571"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Peris-Lopez, P., Dimitrakakis, C., Vaudenay, S.: On selecting the nonce length in distance-bounding protocols. The Computer Journal (2013)","DOI":"10.1093\/comjnl\/bxt033"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance Bounding Protocols for RFID Enhanced by Using Void-challenges and Analysis in Noisy Channels. Wireless Communications and Mobile Computing\u00a08, 1227\u20131232 (2008)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Munilla, J., Peinado, A.: Security Analysis of Tu and Piramuthu\u2019s Protocol. In: New Technologies, Mobility and Security \u2013 NTMS 2008, Tangier, Morocco, pp. 1\u20135. IEEE Computer Society (November 2008)","DOI":"10.1109\/NTMS.2008.ECP.88"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.comcom.2010.01.002","volume":"33","author":"J. Munilla","year":"2010","unstructured":"Munilla, J., Peinado, A.: Attacks on a Distance Bounding Protocol. Computer Communications\u00a033, 884\u2013889 (2010)","journal-title":"Computer Communications"},{"key":"8_CR32","unstructured":"Nikov, V., Vauclair, M.: Yet Another Secure Distance-Bounding Protocol. In: Proceedings of the Conference on Security and Cryptography (SECRYPT 2008), pp. 218\u2013221 (July 2008)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., \u010capkun, S.: Location Privacy of Distance Bounding. In: Proceedings of the Annual Conference on Computer and Communications Security (CCS), pp. 149\u2013160. ACM (2008)","DOI":"10.1145\/1455770.1455791"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-based Protocols. In: ASIACCS 2007: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 204\u2013213. ACM (2007)","DOI":"10.1145\/1229285.1229314"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"D. Singel\u00e9e","year":"2007","unstructured":"Singel\u00e9e, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 101\u2013115. Springer, Heidelberg (2007)"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Toiruul, B., Lee, K.O., Kim, J.M.: SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation. In: International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 29\u201334 (November 2007)","DOI":"10.1109\/UBICOMM.2007.39"},{"key":"8_CR37","unstructured":"Tu, Y.-J., Piramuthu, S.: RFID Distance Bounding Protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (2007)"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:49:09Z","timestamp":1558316949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}