{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:12Z","timestamp":1750306992422,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462129","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"207-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Efficient, secure, private distance bounding without key updates"],"prefix":"10.1145","author":[{"given":"Jens","family":"Hermans","sequence":"first","affiliation":[{"name":"KU Leuven, ESAT\/COSIC &amp; iMinds, Leuven, Belgium"}]},{"given":"Roel","family":"Peeters","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT\/COSIC &amp; iMinds, Leuven, Belgium"}]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[{"name":"CASED &amp; TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n      Abdalla M.\n      Bellare and \n      P.\n      Rogaway\n  . \n  The Oracle Diffie-Hellman assumptions and an analysis of DHIES\n  . In D. Naccache editor Cryptographer's Track at RSA Conference volume \n  2020\n   of \n  LNCS pages \n  143\n  --\n  158\n  . \n  Springer 2001\n  .   M. Abdalla M. Bellare and P. Rogaway. The Oracle Diffie-Hellman assumptions and an analysis of DHIES. In D. Naccache editor Cryptographer's Track at RSA Conference volume 2020 of LNCS pages 143--158. Springer 2001.","DOI":"10.1007\/3-540-45353-9_12"},{"key":"e_1_3_2_1_2_1","volume-title":"Journal of Computer Security - Special Issue on RFID System Security, 2010","author":"Avoine G.","year":"2010","unstructured":"G. Avoine , M. A. Bingol , S. Karda , C. Lauradoux , and B. Martin . A formal framework for analyzing RFID distance bounding protocols . In Journal of Computer Security - Special Issue on RFID System Security, 2010 , 2010 . G. Avoine, M. A. Bingol, S. Karda, C. Lauradoux, and B. Martin. A formal framework for analyzing RFID distance bounding protocols. In Journal of Computer Security - Special Issue on RFID System Security, 2010, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998437"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_21"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0120-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_6"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"344","volume-title":"Advances in Cryptology -- EUROCRYPT'93","author":"Brands S.","year":"1993","unstructured":"S. Brands and D. Chaum . Distance-bounding protocols . In Advances in Cryptology -- EUROCRYPT'93 , volume 765 of LNCS , pages 344 -- 359 . Springer , 1993 . S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology -- EUROCRYPT'93, volume 765 of LNCS, pages 344--359. Springer, 1993."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-6154-z"},{"key":"e_1_3_2_1_9_1","series-title":"LNCS","first-page":"466","volume-title":"Advances in Cryptology -- CRYPTO","author":"Brown D. R. L.","year":"2007","unstructured":"D. R. L. Brown and K. Gj\u00f8steen . A security analysis of the NIST SP 800-90 elliptic curve random number generator . In A. Menezes, editor, Advances in Cryptology -- CRYPTO , volume 4622 of LNCS , pages 466 -- 481 . Springer , 2007 . D. R. L. Brown and K. Gj\u00f8steen. A security analysis of the NIST SP 800-90 elliptic curve random number generator. In A. Menezes, editor, Advances in Cryptology -- CRYPTO, volume 4622 of LNCS, pages 466--481. Springer, 2007."},{"key":"e_1_3_2_1_10_1","series-title":"IFIP AICT","first-page":"222","volume-title":"Security and Privacy in the Age of Ubiquitous Computing","author":"Bussard L.","year":"2005","unstructured":"L. Bussard and W. Bagga . Distance-bounding proof of knowledge to avoid real-time attacks . In Security and Privacy in the Age of Ubiquitous Computing , volume 181 of IFIP AICT , pages 222 -- 238 . Springer , 2005 . L. Bussard and W. Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In Security and Privacy in the Age of Ubiquitous Computing, volume 181 of IFIP AICT, pages 222--238. Springer, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088736"},{"key":"e_1_3_2_1_12_1","first-page":"125","volume-title":"USENIX","author":"Danev B.","year":"2009","unstructured":"B. Danev , T. S. Heydt-Benjamin , and S.vCapkun. Physical-layer identification of RFID devices . In USENIX , pages 125 -- 136 . USENIX, 2009 . B. Danev, T. S. Heydt-Benjamin, and S.vCapkun. Physical-layer identification of RFID devices. In USENIX, pages 125--136. USENIX, 2009."},{"key":"e_1_3_2_1_13_1","first-page":"15","volume-title":"SecuriCom","author":"Desmedt Y.","year":"1988","unstructured":"Y. Desmedt . Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them . In SecuriCom , pages 15 -- 17 . SEDEP Paris, France , 1988 . Y. Desmedt. Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SecuriCom, pages 15--17. SEDEP Paris, France, 1988."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2051002.2051008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462128"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography","author":"Goldreich O.","year":"2001","unstructured":"O. Goldreich . Foundations of Cryptography : Volume 1 , Basic Tools. Cambridge University Press , 2001 . O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J.\n      Hermans A.\n      Pashalidis F.\n      Vercauteren and \n      B.\n      Preneel\n  . \n  A new RFID privacy model\n  . In V. Atluri and C. Diaz editors ESORICS \n  2011 volume \n  6879\n   of \n  LNCS pages \n  568\n  --\n  587\n  . \n  Springer 2011.   J. Hermans A. Pashalidis F. Vercauteren and B. Preneel. A new RFID privacy model. In V. Atluri and C. Diaz editors ESORICS 2011 volume 6879 of LNCS pages 568--587. Springer 2011.","DOI":"10.1007\/978-3-642-23822-2_31"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_9"},{"key":"e_1_3_2_1_21_1","first-page":"98","volume-title":"LNCS","author":"Kim C. H.","year":"2008","unstructured":"C. H. Kim , G. Avoine , F. Koeune , F. Standaert , and O. Pereira . The swiss-knife RFID distance bounding protocol. In Information Security and Cryptology (ICISC) 2008 , LNCS , pages 98 -- 115 . Springer , 2008 . C. H. Kim, G. Avoine, F. Koeune, F. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In Information Security and Cryptology (ICISC) 2008, LNCS, pages 98--115. Springer, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.148"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741877"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"A.\n      Ranganathan N. O.\n      Tippenhauer D.\n      Singel\u00e9e B.\n      Skoric and \n      S.\n      Capkun\n  . \n  Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System\n  . In S. Foresti F. Martinelli and M. Yung editors ESORICS \n  2012 volume \n  7459\n   of \n  LNCS pages \n  415\n  --\n  432\n  . \n  Springer-Verlag 2012.  A. Ranganathan N. O. Tippenhauer D. Singel\u00e9e B. Skoric and S. Capkun. Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. In S. Foresti F. Martinelli and M. Yung editors ESORICS 2012 volume 7459 of LNCS pages 415--432. Springer-Verlag 2012.","DOI":"10.1007\/978-3-642-33167-1_24"},{"key":"e_1_3_2_1_27_1","first-page":"389","volume-title":"USENIX","author":"Rasmussen K. B.","year":"2010","unstructured":"K. B. Rasmussen and S.vCapkun. Realization of RF Distance Bounding . In USENIX , pages 389 -- 402 . USENIX, 2010 . K. B. Rasmussen and S.vCapkun. Realization of RF Distance Bounding. In USENIX, pages 389--402. USENIX, 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"e_1_3_2_1_29_1","unstructured":"SHA-3 Zoo. Overview of all Candidates for the Current SHA-3 Hash Competition Organized by NIST. http:\/\/ehash.iaik.tugraz.at\/wiki\/The_SHA-3_Zoo.  SHA-3 Zoo. Overview of all Candidates for the Current SHA-3 Hash Competition Organized by NIST. http:\/\/ehash.iaik.tugraz.at\/wiki\/The_SHA-3_Zoo."},{"key":"e_1_3_2_1_30_1","series-title":"LNCS","first-page":"239","volume-title":"RFIDSec","author":"Trujillo-Rasua R.","year":"2010","unstructured":"R. Trujillo-Rasua , B. Martin , and G. Avoine . The Poulidor distance-bounding protocol . In RFIDSec 2010 , volume 6370 of LNCS , pages 239 -- 257 . Springer , 2010. R. Trujillo-Rasua, B. Martin, and G. Avoine. The Poulidor distance-bounding protocol. In RFIDSec 2010, volume 6370 of LNCS, pages 239--257. Springer, 2010."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29804-2_6"},{"key":"e_1_3_2_1_32_1","series-title":"LNCS","first-page":"68","volume-title":"Advances in Cryptology -- Asiacrypt","author":"Vaudenay S.","year":"2007","unstructured":"S. Vaudenay . On privacy models for RFID . In Advances in Cryptology -- Asiacrypt 2007 , volume 4883 of LNCS , pages 68 -- 87 . Springer , 2007. S. Vaudenay. On privacy models for RFID. In Advances in Cryptology -- Asiacrypt 2007, volume 4883 of LNCS, pages 68--87. Springer, 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27257-8_12"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.95"}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Budapest Hungary","acronym":"WISEC'13"},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":32,"alternative-id":["10.1145\/2462096.2462129","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462129","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}