{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:35:08Z","timestamp":1725708908651},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/comnet.2017.8285598","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:52:22Z","timestamp":1518475942000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem"],"prefix":"10.1109","author":[{"given":"Jamel","family":"Miri","sequence":"first","affiliation":[]},{"given":"Bechir","family":"Nsiri","sequence":"additional","affiliation":[]},{"given":"Ridha","family":"Bouallegue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"RFID Distance Bounding Protocols","author":"tu","year":"2007","journal-title":"First International EURASIP Workshop on RFID Technology"},{"key":"ref11","first-page":"389","article-title":"Realization of RF Distance Bounding","author":"rasmussen","year":"2010","journal-title":"Proceedings of the 19th USENIX Security Symposium"},{"key":"ref12","article-title":"Distance bounding protocols with voidchallenges for RFID","author":"munilla","year":"2006","journal-title":"printed handout at the Workshop on RFID Security (RFIDSec)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40392-7_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_7"},{"journal-title":"Security and Privacy in Location-Based Mobile Ad-Hoc Networks","year":"2010","author":"defrawy","key":"ref16"},{"journal-title":"Aspects of Hardware Methodologies for the NTRU Public-Key Cryptosystem","year":"2008","author":"wilhelm","key":"ref17"},{"key":"ref18","article-title":"Practical Comparision of Fast Public-Key Cryptosystems","author":"karu","year":"2000","journal-title":"Tik-110 501 Seminar on Network Security"},{"journal-title":"Cryptography for Ultra-Low Power Devices","year":"2006","author":"kaps","key":"ref19"},{"key":"ref4","first-page":"344","article-title":"Distance-Bounding Protocols","author":"brands","year":"1993","journal-title":"Advances in Cryptology-EUROCRYPT'93"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_38"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684000"},{"journal-title":"Comparing Distance Bounding Protocols a Critical Mission Supported by Decision Theory","year":"2015","author":"avoine","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1998.722545"},{"journal-title":"UWB forum","year":"0","key":"ref1"},{"key":"ref9","first-page":"301","article-title":"Secure distance bounding on TH-UWB","author":"miri","year":"2016","journal-title":"Proceedings of the International Conference on IT Convergence and Security"},{"key":"ref20","first-page":"2","article-title":"Public Key Cryptography in Sensor Networks","author":"gaubatz","year":"0","journal-title":"ESAS 2004 1st European Workshop on Security in Ad-Hoc and Sensor Networks"}],"event":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","start":{"date-parts":[[2017,3,29]]},"location":"Hammamet","end":{"date-parts":[[2017,4,1]]}},"container-title":["2017 Sixth International Conference on Communications and Networking (ComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8275442\/8285582\/08285598.pdf?arnumber=8285598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T21:52:46Z","timestamp":1521496366000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8285598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/comnet.2017.8285598","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}