{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:22:53Z","timestamp":1729617773076,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/rfid-ta.2012.6404571","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T15:25:42Z","timestamp":1358436342000},"page":"74-79","source":"Crossref","is-referenced-by-count":7,"title":["Mafia fraud attack against the R&amp;#x010C; Distance-Bounding Protocol"],"prefix":"10.1109","author":[{"given":"Aikaterini","family":"Mitrokotsa","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/SECURECOMM.2005.56"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TWC.2010.01.090935"},{"year":"2005","author":"hancke","journal-title":"A Practical Relay Attack on ISO 14443 Proximity Cards","key":"18"},{"key":"15","first-page":"47","article-title":"A formal approach to distance bounding RFID protocols","author":"diirholz","year":"2011","journal-title":"Proceedings of the 14th Information Security Corerence ISC 2011"},{"key":"16","article-title":"Relay attacks on passive keyless entry and start systems in modem cars","author":"franciuon","year":"2010","journal-title":"Cryptology ePrint Archive Report"},{"key":"13","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"14","first-page":"71","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"11","article-title":"Distance hijacking attacks on distance bounding protocols","author":"cremers","year":"2011","journal-title":"Cryptology ePrint Archive Report"},{"key":"12","first-page":"15","article-title":"'Major security problems with the unforgeable' (Feige)-fiat-shamir proofs of identity and how to overcome them","author":"desmedt","year":"1988","journal-title":"Computers & Security"},{"key":"21","first-page":"98","article-title":"The swiss-knife RFlD distance bounding protocol","author":"kim","year":"2009","journal-title":"Proceedings of the 14th Information Security Conference ISC 2011"},{"key":"20","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","article-title":"RFID distance bounding protocol with mixed challenges to prevent relay attacks","volume":"5888","author":"kim","year":"2009","journal-title":"Proceedings of the 8th International Corerence on Cryptology and Networks Security (CANS 2009)"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/1455770.1455791"},{"key":"23","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1229285.1229314","article-title":"Detecting relay attacks with timing-based protocols","author":"reid","year":"2007","journal-title":"ASIACCS"},{"key":"24","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","article-title":"Distance bounding in noisy environments","volume":"4572","author":"singelee","year":"2007","journal-title":"1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS"},{"key":"25","article-title":"BlueSniff: Eve meets alice and bluetooth","author":"spill","year":"2007","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"26","first-page":"239","article-title":"The poulidor distance-bounding protocol","author":"trujillo-rasua","year":"2010","journal-title":"RFlDSec"},{"key":"3","article-title":"A formal framework for analyzing RFID distance bounding protocols","author":"avoine","year":"2010","journal-title":"Fournal of Computer Security - Special Issue on RFID System Security"},{"key":"2","first-page":"78","article-title":"A note on a privacy-preserving distance bounding protocol","author":"aumasson","year":"0","journal-title":"Proceedings of the 13th International Corerence on Lrormation and Communications Security (ICICS 2011)"},{"key":"10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11964254_9","article-title":"So near and yet so far: Distance-bounding attacks in wireless networks","volume":"4357","author":"clulow","year":"2006","journal-title":"Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"key":"1","article-title":"Security analysis of two distance-bounding protocols","author":"abyneh","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"key":"7","first-page":"222","article-title":"Distance-bounding proof of knowledge to avoid real-time attacks","volume":"181","author":"bussard","year":"2005","journal-title":"Security and Privacy in the Age of Ubiquitous Computing"},{"key":"6","first-page":"344","article-title":"Distance-bounding protocols","author":"brands","year":"1993","journal-title":"Advances in Cryptology - Eurocrypt'94 Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","article-title":"An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement","volume":"5735","author":"avoine","year":"2009","journal-title":"Information Security"},{"key":"4","first-page":"220","article-title":"Optimal security limits of RFlD distance bounding protocols","author":"avoine","year":"2010","journal-title":"RFlDSec"},{"key":"9","article-title":"Implementation details of a multi purpose ISO 14443 RFlD-tool","author":"carluccio","year":"2006","journal-title":"Printed Handout of Workshop on RFlD Security - RFlDSec 06"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/986858.986862"}],"event":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","start":{"date-parts":[[2012,11,5]]},"location":"Nice, France","end":{"date-parts":[[2012,11,7]]}},"container-title":["2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6385220\/6404490\/06404571.pdf?arnumber=6404571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:50:30Z","timestamp":1498009830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2012.6404571","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}