{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:47:34Z","timestamp":1759146454317,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2018,7,1]]},"DOI":"10.1109\/tmc.2017.2771769","type":"journal-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T21:44:33Z","timestamp":1510263873000},"page":"1723-1736","source":"Crossref","is-referenced-by-count":15,"title":["Two-Hop Distance-Bounding Protocols: Keep Your Friends Close"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-6571","authenticated-orcid":false,"given":"Anjia","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7804-6696","authenticated-orcid":false,"given":"Elena","family":"Pagnin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7073-0258","authenticated-orcid":false,"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2388-3542","authenticated-orcid":false,"given":"Gerhard P.","family":"Hancke","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"55","article-title":"Towards secure distance bounding","author":"boureanu","year":"2013","journal-title":"Proc of the ACM SIGSOFT Int'l Symp on the Foundations of Softw Eng"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2323979"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0408"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462129"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590331"},{"key":"ref17","first-page":"873","article-title":"Efficient public-key distance bounding protocol","author":"k?l?n\u00e7","year":"2016","journal-title":"Advances in Cryptology - ASIACRYPT?98"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_15"},{"key":"ref19","first-page":"389","article-title":"Realization of RF distance bounding","author":"rasmussen","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"ref3","first-page":"344","article-title":"Distance-bounding protocols (extended abstract)","author":"brands","year":"1993","journal-title":"EUROCRYPT'93 Lect Notes in Computer Science 765"},{"key":"ref6","article-title":"The swiss-knife RFID distance bounding protocol","author":"kim","year":"2008","journal-title":"Information Security and Cryptology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_25"},{"article-title":"Practical and provably secure distance-bounding","year":"2013","author":"boureanu","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_33"},{"key":"ref1","first-page":"189","article-title":"Secure neighbour discovery in wireless networks: Formal investigation of possibility","author":"potularski","year":"2008","journal-title":"Proc 10th ACM Symp Inf Comput Commun Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.19"},{"key":"ref22","first-page":"91","article-title":"Robust statistical methods for securing wireless\n localization in sensor networks","author":"li","year":"2005","journal-title":"Proc IEEE Symp Inform Process Sensor Netw"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481347"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2434373"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8371207\/08103055.pdf?arnumber=8103055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:24Z","timestamp":1642004544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8103055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,1]]},"references-count":25,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2017.2771769","relation":{},"ISSN":["1536-1233"],"issn-type":[{"type":"print","value":"1536-1233"}],"subject":[],"published":{"date-parts":[[2018,7,1]]}}}