{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:19:14Z","timestamp":1729667954260,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451066","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T20:06:51Z","timestamp":1203106011000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Key Establishment Using Secure Distance Bounding Protocols"],"prefix":"10.1109","author":[{"given":"Dave","family":"Singelee","sequence":"first","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/PBTE051E_ch9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11814764_21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/3-540-44810-1_27","article-title":"The Resurrecting Duckling - what next?","author":"stajano","year":"2001","journal-title":"Proceedings of the 8th International Workshop on Security Protocols"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref15","first-page":"306","article-title":"Secure Device Pairing based on a Visual Channel (Short Paper)","author":"saxena","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (SP '06)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161291"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-540-27809-2_22","article-title":"The Ephemeral Pairing Problem","author":"hoepman","year":"2004","journal-title":"Financial Cryptography"},{"key":"ref3","first-page":"29","article-title":"Manual Authentication for Wireless Devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"RSA CryptoBytes"},{"key":"ref6","first-page":"172","article-title":"The Resurrecting Duck-ling: Security Issues in Ad-Hoc Wireless Networks","author":"stajano","year":"1999","journal-title":"Proceedings of the 7th International Workshop on Security Protocols"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","article-title":"Talking to Strangers: Authentication in Adhoc Wireless Networks","author":"balfanz","year":"2002","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref1","article-title":"The Energy Cost of Secrets in Ad-Hoc Networks","author":"hodjat","year":"2002","journal-title":"Proc IEEE Workshop Wireless Communications and Networking (CAS '02)"},{"article-title":"The Bluesniper Rifle","year":"2004","author":"cheung","key":"ref20"},{"key":"ref22","first-page":"15","article-title":"Major Security Problems with the &#x201C;Unforgeable&#x201D; (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them","author":"desmedt","year":"1988","journal-title":"Proceedings of Securicom 88"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11964254_9","article-title":"So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks","author":"clulow","year":"2006","journal-title":"Proceedings of the 3rd EuropeanWorkshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","start":{"date-parts":[[2007,8,6]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451066.pdf?arnumber=4451066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T04:35:27Z","timestamp":1497760527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451066","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}