{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:49:18Z","timestamp":1729637358469,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195788","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:26:40Z","timestamp":1337884000000},"page":"478-485","source":"Crossref","is-referenced-by-count":8,"title":["Expected loss bounds for authentication in constrained channels"],"prefix":"10.1109","author":[{"given":"Christos","family":"Dimitrakakis","sequence":"first","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009842"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729330"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646126"},{"journal-title":"Optimal Statistical Decisions","year":"1970","author":"degroot","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706205"},{"key":"13","first-page":"147","article-title":"Major security problems with the \"unforgeable\" (Feige)-Fiat-Shamir proofs of identity and how to overcome them","author":"desmedt","year":"0","journal-title":"Proc SecuriCom '88 Mar 1988"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16280-0_10"},{"key":"11","article-title":"The Swiss-knife RFID distance bounding protocol","author":"kim","year":"2008","journal-title":"LNCS"},{"journal-title":"Expected Loss Analysis of Thresholded Authentication Protocols in Noisy Conditions","year":"2011","author":"dimitrakakis","key":"12"},{"journal-title":"Study and Design of A Security Architecture for Wireless Personal Area Networks","year":"2008","author":"singele?e","key":"21"},{"key":"3","first-page":"344","article-title":"Distance-bounding protocols","volume":"765","author":"brands","year":"1994","journal-title":"LNCS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"2"},{"journal-title":"Cryptography and Network Security","year":"2006","author":"stallings","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1229285.1229314","article-title":"Detecting relay attacks with timing-based protocols","author":"reid","year":"2007","journal-title":"Proc ASIACCS'07"},{"journal-title":"Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks","year":"2010","author":"peris-lopez","key":"7"},{"key":"6","first-page":"621","article-title":"ID-Based Secure Distance Bounding and Localization","volume":"5789","author":"tippenhauer","year":"2010","journal-title":"LNCS"},{"key":"5","first-page":"101","article-title":"Distance bounding in noisy environments","volume":"4572","author":"singele?e","year":"2007","journal-title":"LNCS"},{"key":"4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/0-387-25660-1_15","article-title":"Distance-bounding proof of knowledge to avoid real-time attacks","volume":"181","author":"bussard","year":"2005","journal-title":"Security and Privacy in the Age of Ubiquitous Computing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"8","article-title":"RFID distance bounding protocol with mixed challenges to prevent relay attacks","author":"kim","year":"2009","journal-title":"Cryptology"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","start":{"date-parts":[[2012,3,25]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195788.pdf?arnumber=6195788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:14:23Z","timestamp":1497971663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195788","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}