{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:10:10Z","timestamp":1746295810895,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439326"},{"type":"electronic","value":"9783662439333"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43933-3_4","type":"book-chapter","created":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T05:23:03Z","timestamp":1404710583000},"page":"55-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Towards Secure Distance Bounding"],"prefix":"10.1007","author":[{"given":"Ioana","family":"Boureanu","sequence":"first","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,8]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-25243-3_7","volume-title":"Information and Communications Security","author":"J-P Aumasson","year":"2011","unstructured":"Aumasson, J.-P., Mitrokotsa, A., Peris-Lopez, P.: A note on a privacy-preserving distance-bounding protocol. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 78\u201392. Springer, Heidelberg (2011)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, B.: How secret-sharing can defeat terrorist fraud. In: ACM Conference on Wireless Network Security WISEC\u201911, Hamburg, Germany, pp. 145\u2013156. ACM (2011)","DOI":"10.1145\/1998412.1998437"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-38519-3_23","volume-title":"Information Security and Cryptology","author":"A Bay","year":"2013","unstructured":"Bay, A., Boureanu, I., Mitrokotsa, A., Spulber, I., Vaudenay, S.: The Bussard-Bagga and other distance-bounding protocols under attacks. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 371\u2013391. Springer, Heidelberg (2013)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-33481-8_6","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"I Boureanu","year":"2012","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On the pseudorandom function assumption in (secure) distance-bounding protocols - PRF-ness alone does not stop the frauds!. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 100\u2013120. Springer, Heidelberg (2012)"},{"key":"4_CR6","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On the Need for Secure Distance-Bounding. In: Proceedings of ESC\u201913 (to appear)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-40392-7_8","volume-title":"Lightweight Cryptography for Security and Privacy","author":"I Boureanu","year":"2013","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Secure and lightweight distance-bounding. In: Avoine, G., Kara, O. (eds.) LightSec 2013. LNCS, vol. 8162, pp. 97\u2013113. Springer, Heidelberg (2013)"},{"key":"4_CR8","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Practical provably secure distance-bounding. In: Proceedings of ISC 13 (to appear)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"4_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/0-387-25660-1_15","volume-title":"Security and Privacy in the Age of Ubiquitous Computing","author":"L Bussard","year":"2005","unstructured":"Bussard, L., Bagga, W.: Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC 2005. IFIP AICT, vol. 181, pp. 223\u2013238. Springer, Heidelberg (2005)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Butty\u00e1n, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks SASN\u201903, Fairfax VA, USA, pp. 21\u201332. ACM (2003)","DOI":"10.1145\/986858.986862"},{"issue":"4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1214\/aoms\/1177729330","volume":"23","author":"H Chernoff","year":"1952","unstructured":"Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23(4), 493\u2013507 (1952)","journal-title":"Ann. Math. Stat."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Cremers, C.J. F., Rasmussen, K.B., Schmidt, B., \u010capkun, S.: Distance hijacking attacks on distance bounding protocols. In: IEEE Symposium on Security and Privacy S&P\u201912, San Francisco CA, USA, pp. 113\u2013127. IEEE Computer Society (2012)","DOI":"10.1109\/SP.2012.17"},{"key":"4_CR14","unstructured":"Desmedt, Y.: Major security problems with the \u201cUnforgeable\u201d (Feige-)Fiat-Shamir Proofs of Identity and how to overcome them. In: Congress on Computer and Communication Security and Protection Securicom\u201988, Paris, France, pp. 147\u2013159. SEDEP, Paris, France (1988)"},{"key":"4_CR15","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding gainst smartcard relay attacks. In: USENIX Security Symposium, Boston MA, USA, pp. 87\u2013102. USENIX (2007)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C., Mitrokotsa, A., Vaudenay, S.: Expected loss bounds for authentication in constrained channels. In: Proceedings of the IEEE INFOCOM\u201912, Orlando FL, USA, pp. 478\u2013485. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195788"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-24861-0_4","volume-title":"Information Security","author":"U D\u00fcrholz","year":"2011","unstructured":"D\u00fcrholz, U., Fischlin, M., Kasper, M., Onete, C.: A formal approach to distance-bounding RFID protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47\u201362. Springer, Heidelberg (2011)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-19348-4_6","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"A \u00d6zhan G\u00fcrel","year":"2011","unstructured":"\u00d6zhan G\u00fcrel, A., Arslan, A., Akg\u00fcn, M.: Non-uniform stepping approach to RFID Distance bounding problem. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 64\u201378. Springer, Heidelberg (2011)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: Distance bounding for RFID: effectiveness of terrorist fraud. In: Conference on RFID-Technologies and Applications RFID-TA\u201912, Nice, France, pp. 91\u201396. IEEE (2012)","DOI":"10.1109\/RFID-TA.2012.6404574"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Conference on Security and Privacy for Emerging Areas in Communications Networks SecureComm\u201905, Athens, Greece, pp. 67\u201373. IEEE (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.cose.2009.06.001","volume":"28","author":"GP Hancke","year":"2009","unstructured":"Hancke, G.P., Mayes, K., Markantonakis, K.: Confidence in smart token proximity: relay attacks revisited. Comput. Secur. 28, 615\u2013627 (2009)","journal-title":"Comput. Secur."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Hermans, J., Onete, C., Peeters, R.: Efficient, secure, private distance bounding without key updates. In: ACM Conference on Security and Privacy in Wireless and Mobile Networks WISEC\u201913, Budapest, Hungary, pp. 207\u2013218. ACM (2013)","DOI":"10.1145\/2462096.2462129"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","volume-title":"Computer Security \u2013 ESORICS 2011","author":"J Hermans","year":"2011","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568\u2013587. Springer, Heidelberg (2011)"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume-title":"Cryptology and Network Security","author":"CH Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119\u2013133. Springer, Heidelberg (2009)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"CH Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/LCOMM.2010.02.091946","volume":"14","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P., Hermandez-Castro, J.C.: Reid et al\u2019.s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14, 121\u2013123 (2010)","journal-title":"IEEE Commun. Lett."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Onete, C., Vaudenay, S.: Mafia fraud attack against the RC distance- bounding protocol. In: Conference on RFID-Technologies and Applications RFID-TA\u201912, Nice, France, pp. 74\u201379. IEEE (2012)","DOI":"10.1109\/RFID-TA.2012.6404571"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Mitrokotsa, A., Peris-Lopez, P., Dimitrakakis, C., Vaudenay, S.: On selecting the nonce length in distance-bounding protocols. To appear in the Computer Journal (Oxford), Special Issue on Advanced Semantic and Social Multimedia Technologies for Future Computing Environment (2013). doi:10.1093\/comjnl\/bxt033","DOI":"10.1093\/comjnl\/bxt033"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput. 8, 1227\u20131232 (2008)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Munilla, J., Peinado, A.: Security analysis of Tu and Piramuthu\u2019s protocol. In: Conference on New Technologies, Mobility and Security NTMS\u201908, Tangier, Morocco, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/NTMS.2008.ECP.88"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Nikov, V., Vauclair, M.: Yet another secure distance-bounding protocol. In: International Conference on Security and Cryptography Porto, Portugal, pp. 218-221. INSTICC Press (2008)","DOI":"10.5220\/0001926402180221"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-35404-5_19","volume-title":"Cryptology and Network Security","author":"K Ouafi","year":"2012","unstructured":"Ouafi, K., Vaudenay, S.: Strong privacy for RFID systems from plaintext-aware encryption. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 247\u2013262. Springer, Heidelberg (2012)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., Capkun, S.: Location privacy of distance bounding protocols. In: 15th ACM Conference on Computer and Communications Security, Alexandria VA, USA, pp. 149\u2013160. ACM Press (2008)","DOI":"10.1145\/1455770.1455791"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-Based Protocols. In: ACM Symposium on Information, Computer and Communications Security ASIACCS\u201907, Singapore, pp. 204\u2013213. ACM (2007)","DOI":"10.1145\/1229285.1229314"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"D Singel\u00e9e","year":"2007","unstructured":"Singel\u00e9e, D., Preneel, B.: Distance bounding in noisy environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101\u2013115. Springer, Heidelberg (2007)"},{"key":"4_CR36","unstructured":"Tu, Y.J., Piramuthu, S.: RFID distance bounding protocols. In: EURASIP Workshop on RFID Technology, Vienna, Austria (2007)"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68\u201387. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43933-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:52:24Z","timestamp":1746294744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43933-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439326","9783662439333"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43933-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}