{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:04Z","timestamp":1750307344991,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T00:00:00Z","timestamp":1308009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,14]]},"DOI":"10.1145\/1998412.1998437","type":"proceedings-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T13:47:14Z","timestamp":1308664034000},"page":"145-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["How secret-sharing can defeat terrorist fraud"],"prefix":"10.1145","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain la Neuve, Belgium"}]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Lyon, INRIA, Villeurbanne, France"}]},{"given":"Benjamin","family":"Martin","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain la Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2011,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security -- Special Issue on RFID System Security","author":"Avoine G.","year":"2010","unstructured":"G. Avoine , M. A. Bing\u00f6l , S. Karda\u015f , C. Lauradoux , and B. Martin . A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security -- Special Issue on RFID System Security , 2010 . G. Avoine, M. A. Bing\u00f6l, S. Karda\u015f, C. Lauradoux, and B. Martin. A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security -- Special Issue on RFID System Security, 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_20"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10628-6_20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196726"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"169","volume-title":"Advances in Cryptology - CRYPTO '90","author":"Beth T.","year":"1990","unstructured":"T. Beth and Y. Desmedt . Identification Tokens - or: Solving the Chess Grandmaster Problem . In Advances in Cryptology - CRYPTO '90 , volume 537 of Lecture Notes in Computer Science , pages 169 -- 177 , Santa Barbara, CA , USA, August 1990 . Springer-Verlag . T. Beth and Y. Desmedt. Identification Tokens - or: Solving the Chess Grandmaster Problem. In Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 169--177, Santa Barbara, CA, USA, August 1990. Springer-Verlag."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_7_1","volume-title":"Security Protocols Workshop","volume":"2133","author":"Blaze M.","year":"2000","unstructured":"M. Blaze . Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion) . In Security Protocols Workshop , volume 2133 of Lecture Notes in Computer Science, pages 54--61, Cambridge, UK , April 2000 . Springer-Verlag. M. Blaze. Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). In Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, pages 54--61, Cambridge, UK, April 2000. Springer-Verlag."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","first-page":"344","volume-title":"Advances in Cryptology - EUROCRYPT'93","author":"Brands S.","year":"1993","unstructured":"S. Brands and D. Chaum . Distance-Bounding Protocols . In Advances in Cryptology - EUROCRYPT'93 , volume 765 of Lecture Notes in Computer Science , pages 344 -- 359 , Lofthus, Norway, May 1993 . Springer-Verlag . S. Brands and D. Chaum. Distance-Bounding Protocols. In Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 344--359, Lofthus, Norway, May 1993. Springer-Verlag."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196772"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_15"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","first-page":"13","volume-title":"Advances in Cryptology - EUROCRYPT '94","author":"Csirmaz L.","year":"1994","unstructured":"L. Csirmaz . The Size of a Share Must Be Large . In Advances in Cryptology - EUROCRYPT '94 , volume 950 of Lecture Notes in Computer Science , pages 13 -- 22 , Perugia, Italy , 1994 . Springer-Verlag . L. Csirmaz. The Size of a Share Must Be Large. In Advances in Cryptology - EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 13--22, Perugia, Italy, 1994. Springer-Verlag."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO'87","author":"Desmedt Y.","year":"1988","unstructured":"Y. Desmedt , C. Goutier , and S. Bengio . Special Uses and Abuses of the Fiat-Shamir Passport Protocol . In Advances in Cryptology - CRYPTO'87 , volume 293 of Lecture Notes in Computer Science , pages 21 -- 39 , Santa Barbara, CA , USA, August 1988 . Springer-Verlag . Y. Desmedt, C. Goutier, and S. Bengio. Special Uses and Abuses of the Fiat-Shamir Passport Protocol. In Advances in Cryptology - CRYPTO'87, volume 293 of Lecture Notes in Computer Science, pages 21--39, Santa Barbara, CA, USA, August 1988. Springer-Verlag."},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"16th USENIX Security Symposium on USENIX Security Symposium","author":"Drimer S.","year":"2007","unstructured":"S. Drimer and S. J. Murdoch . Keep your enemies close: distance bounding against smartcard relay attacks . In 16th USENIX Security Symposium on USENIX Security Symposium , pages 1 -- 16 , Santa Clara, CA, USA , June 2007 . USENIX Association. S. Drimer and S. J. Murdoch. Keep your enemies close: distance bounding against smartcard relay attacks. In 16th USENIX Security Symposium on USENIX Security Symposium, pages 1--16, Santa Clara, CA, USA, June 2007. USENIX Association."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741887"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.04.014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352566"},{"key":"e_1_3_2_1_19_1","unstructured":"International Organization for Standardization. ISO\/IEC 9798 -- Information technology -- Security techniques -- Entity authentication 1997 -- 2008.  International Organization for Standardization. ISO\/IEC 9798 -- Information technology -- Security techniques -- Entity authentication 1997 -- 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_19"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_9"},{"key":"e_1_3_2_1_22_1","volume-title":"The Swiss-Knife RFID Distance Bounding Protocol. In International Conference on Information Security and Cryptology -- ICISC'08","volume":"5461","author":"Kim C. H.","year":"2008","unstructured":"C. H. Kim , G. Avoine , F. Koeune , F.-X. Standaert , and O. Pereira . The Swiss-Knife RFID Distance Bounding Protocol. In International Conference on Information Security and Cryptology -- ICISC'08 , volume 5461 of Lecture Notes in Computer Science, pages 98--115, Seoul, Korea , December 2008 . Springer-Verlag. C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID Distance Bounding Protocol. In International Conference on Information Security and Cryptology -- ICISC'08, volume 5461 of Lecture Notes in Computer Science, pages 98--115, Seoul, Korea, December 2008. Springer-Verlag."},{"key":"e_1_3_2_1_23_1","volume-title":"UWB Impulse Radio Based Distance Bounding. In Workshop on Positioning, Navigation and Communication 2010 - WPNC'10","author":"Kuhn M.","year":"2010","unstructured":"M. Kuhn , H. Luecken , and N. O. Tippenhauer . UWB Impulse Radio Based Distance Bounding. In Workshop on Positioning, Navigation and Communication 2010 - WPNC'10 , Dresden, Germany , March 2010 . M. Kuhn, H. Luecken, and N. O. Tippenhauer. UWB Impulse Radio Based Distance Bounding. In Workshop on Positioning, Navigation and Communication 2010 - WPNC'10, Dresden, Germany, March 2010."},{"key":"e_1_3_2_1_24_1","first-page":"276","volume-title":"Minimal Codewords and Secret Sharing. In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory","author":"Massey J. L.","year":"1993","unstructured":"J. L. Massey . Minimal Codewords and Secret Sharing. In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory , pages 276 -- 279 , 1993 . J. L. Massey. Minimal Codewords and Secret Sharing. In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, pages 276--279, 1993."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/358746.358762"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.02.091946"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v8:9"},{"key":"e_1_3_2_1_28_1","volume-title":"Universitat GH Essen","author":"Paar C.","year":"1994","unstructured":"C. Paar . Efficient VLSI Architectures for Bit Parallel Computation in Galois Fields. PhD thesis , Universitat GH Essen , 1994 . C. Paar. Efficient VLSI Architectures for Bit Parallel Computation in Galois Fields. PhD thesis, Universitat GH Essen, 1994."},{"key":"e_1_3_2_1_29_1","volume-title":"Realization of RF Distance Bounding. In USENIX Security Symposium","author":"Rasmussen K. B.","year":"2010","unstructured":"K. B. Rasmussen and S. Capkun . Realization of RF Distance Bounding. In USENIX Security Symposium , Washington, DC, USA , August 2010 . K. B. Rasmussen and S. Capkun. Realization of RF Distance Bounding. In USENIX Security Symposium, Washington, DC, USA, August 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_4"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_33_1","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Simmons G. J.","year":"1991","unstructured":"G. J. Simmons . Contemporary Cryptology: The Science of Information Integrity . IEEE Press , 1991 . G. J. Simmons. Contemporary Cryptology: The Science of Information Integrity. IEEE Press, 1991."},{"key":"e_1_3_2_1_34_1","volume-title":"Distance Bounding in Noisy Environments. In European Workshop on Security in Ad-hoc and Sensor Networks - ESAS'07","volume":"4572","author":"Singel\u00e9e D.","year":"2007","unstructured":"D. Singel\u00e9e and B. Preneel . Distance Bounding in Noisy Environments. In European Workshop on Security in Ad-hoc and Sensor Networks - ESAS'07 , volume 4572 of Lecture Notes in Computer Science, pages 101--115, Cambridge, UK , July 2007 . Springer-Verlag. D. Singel\u00e9e and B. Preneel. Distance Bounding in Noisy Environments. In European Workshop on Security in Ad-hoc and Sensor Networks - ESAS'07, volume 4572 of Lecture Notes in Computer Science, pages 101--115, Cambridge, UK, July 2007. Springer-Verlag."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11927587_5"},{"key":"e_1_3_2_1_36_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-642-16822-2_19","volume-title":"Workshop on RFID Security -- RFIDSec'10","author":"Rasua R. Trujillo","year":"2010","unstructured":"R. Trujillo Rasua , B. Martin , and G. Avoine . The Poulidor Distance-Bounding Protocol . In S. O. Yalcin, editor, Workshop on RFID Security -- RFIDSec'10 , volume 6370 of Lecture Notes in Computer Science , pages 239 -- 257 , Istanbul, Turkey, June 2010 . Springer-Verlag . R. Trujillo Rasua, B. Martin, and G. Avoine. The Poulidor Distance-Bounding Protocol. In S. O. Yalcin, editor, Workshop on RFID Security -- RFIDSec'10, volume 6370 of Lecture Notes in Computer Science, pages 239--257, Istanbul, Turkey, June 2010. Springer-Verlag."},{"key":"e_1_3_2_1_37_1","volume-title":"RFID Distance Bounding Protocols. In First International EURASIP Workshop on RFID Technology","author":"Tu Y.-J.","year":"2007","unstructured":"Y.-J. Tu and S. Piramuthu . RFID Distance Bounding Protocols. In First International EURASIP Workshop on RFID Technology , Vienna, Austria , September 2007 . Y.-J. Tu and S. Piramuthu. RFID Distance Bounding Protocols. In First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704294"}],"event":{"name":"WISEC'11: Fourth ACM Conference on Wireless Network Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Hamburg Germany","acronym":"WISEC'11"},"container-title":["Proceedings of the fourth ACM conference on Wireless network security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998412.1998437","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1998412.1998437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:27Z","timestamp":1750244787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998412.1998437"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,14]]},"references-count":37,"alternative-id":["10.1145\/1998412.1998437","10.1145\/1998412"],"URL":"https:\/\/doi.org\/10.1145\/1998412.1998437","relation":{},"subject":[],"published":{"date-parts":[[2011,6,14]]},"assertion":[{"value":"2011-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}