{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:23Z","timestamp":1750306403234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766516","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding"],"prefix":"10.1145","author":[{"given":"Elena","family":"Pagnin","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"Gerhard","family":"Hancke","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"52","volume-title":"Secure human identification protocols,\" in Proc. of ASIACRYPT","author":"Hopper N. J.","year":"2001","unstructured":"N. J. Hopper and M. Blum , \" Secure human identification protocols,\" in Proc. of ASIACRYPT , pp. 52 -- 66 , 2001 . N. J. Hopper and M. Blum, \"Secure human identification protocols,\" in Proc. of ASIACRYPT, pp. 52--66, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"e_1_3_2_1_3_1","first-page":"39","volume-title":"Unique Radio Innovation for the 21st Century, ch. Security Primitive Classification of RFID Attacks","author":"Mitrokotsa A.","year":"2011","unstructured":"A. Mitrokotsa , M. Beye , and P. Peris-Lopez , Unique Radio Innovation for the 21st Century, ch. Security Primitive Classification of RFID Attacks , pp. 39 -- 63 . Springer , 2011 . A. Mitrokotsa, M. Beye, and P. Peris-Lopez, Unique Radio Innovation for the 21st Century, ch. Security Primitive Classification of RFID Attacks, pp. 39--63. Springer, 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052622"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.10"},{"key":"e_1_3_2_1_6_1","volume-title":"Securing HB+ against GRS Man-in-the-Middle Attack,\" in Proc. of Symposium on Cryptography and Information Security (SCIS)","author":"Duc D.","year":"2007","unstructured":"D. Duc and K. Kim , \" Securing HB+ against GRS Man-in-the-Middle Attack,\" in Proc. of Symposium on Cryptography and Information Security (SCIS) , 2007 . D. Duc and K. Kim, \"Securing HB+ against GRS Man-in-the-Middle Attack,\" in Proc. of Symposium on Cryptography and Information Security (SCIS), 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.011"},{"key":"e_1_3_2_1_8_1","first-page":"361","volume-title":"HB#: Increasing the security and efficiency of HB+,\" in Proc. of EUROCRYPT","author":"Gilbert H.","year":"2008","unstructured":"H. Gilbert , M. J. B. Robshaw , and Y. Seurin , \" HB#: Increasing the security and efficiency of HB+,\" in Proc. of EUROCRYPT , pp. 361 -- 378 , Springer-Verlag , 2008 . H. Gilbert, M. J. B. Robshaw, and Y. Seurin, \"HB#: Increasing the security and efficiency of HB+,\" in Proc. of EUROCRYPT, pp. 361--378, Springer-Verlag, 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"e_1_3_2_1_11_1","first-page":"74","volume-title":"Mafia fraud attack against the rc distance-bounding protocol,\" in Proc","author":"Mitrokotsa A.","year":"2012","unstructured":"A. Mitrokotsa , C. Onete , and S. Vaudenay , \" Mafia fraud attack against the rc distance-bounding protocol,\" in Proc . of IEEE RFID Technology and Applications (IEEE RFID T-A) , pp. 74 -- 79 , 2012 . A. Mitrokotsa, C. Onete, and S. Vaudenay, \"Mafia fraud attack against the rc distance-bounding protocol,\" in Proc. of IEEE RFID Technology and Applications (IEEE RFID T-A), pp. 74--79, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140518"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1971859.1971864"},{"key":"e_1_3_2_1_14_1","first-page":"78","volume-title":"A note on a privacy-preserving distance-bounding protocol,\" in Proc. of ICICS","author":"Aumasson J.-P.","year":"2011","unstructured":"J.-P. Aumasson , A. Mitrokotsa , and P. Peris-Lopez , \" A note on a privacy-preserving distance-bounding protocol,\" in Proc. of ICICS 2011 , LNCS, (Beijing, China) , pp. 78 -- 92 , November 2011. J.-P. Aumasson, A. Mitrokotsa, and P. Peris-Lopez, \"A note on a privacy-preserving distance-bounding protocol,\" in Proc. of ICICS 2011, LNCS, (Beijing, China), pp. 78--92, November 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.02.091946"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt033"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140521"},{"key":"e_1_3_2_1_19_1","volume-title":"Lightweight authentication protocols on ultra-constrained RFIDs - myths and facts,\" in Proc. of RFIDSec","author":"Armknecht F.","year":"2014","unstructured":"F. Armknecht , M. Hamann , and V. Mikhalev , \" Lightweight authentication protocols on ultra-constrained RFIDs - myths and facts,\" in Proc. of RFIDSec , 2014 . F. Armknecht, M. Hamann, and V. Mikhalev, \"Lightweight authentication protocols on ultra-constrained RFIDs - myths and facts,\" in Proc. of RFIDSec, 2014."},{"key":"e_1_3_2_1_20_1","first-page":"15","volume-title":"of SecuriCom","author":"Desmedt Y.","year":"1988","unstructured":"Y. Desmedt , \"Major Security Problems with the 'Unforgeable' (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome them,\" in Proc. of SecuriCom , pp. 15 -- 17 , SEDEP Paris , France , 1988 . Y. Desmedt, \"Major Security Problems with the 'Unforgeable' (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome them,\" in Proc. of SecuriCom, pp. 15--17, SEDEP Paris, France, 1988."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_21"},{"key":"e_1_3_2_1_23_1","volume-title":"Effectiveness of terrorist fraud in the presence of bit errors,\" in Proc. of IEEE Conference on RFID Technology and Applications (RFID-TA)","author":"Hancke G. P.","year":"2012","unstructured":"G. P. Hancke , \"Distance-bounding for RFID : Effectiveness of terrorist fraud in the presence of bit errors,\" in Proc. of IEEE Conference on RFID Technology and Applications (RFID-TA) , 2012 . G. P. Hancke, \"Distance-bounding for RFID: Effectiveness of terrorist fraud in the presence of bit errors,\" in Proc. of IEEE Conference on RFID Technology and Applications (RFID-TA), 2012."},{"key":"e_1_3_2_1_24_1","volume-title":"Relay attacks on passive keyless entry and start systems in modern cars,\" in Proc. of NDSS","author":"Francillon A.","year":"2011","unstructured":"A. Francillon , B. Danev , and S. Capkun , \" Relay attacks on passive keyless entry and start systems in modern cars,\" in Proc. of NDSS , 2011 . A. Francillon, B. Danev, and S. Capkun, \"Relay attacks on passive keyless entry and start systems in modern cars,\" in Proc. of NDSS, 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_9"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of USENIX Security Symposium","author":"Rasmussen K. B.","year":"2010","unstructured":"K. B. Rasmussen and S. \u010capkun , \"Realization of RF Distance Bounding ,\" in Proc. of USENIX Security Symposium , 2010 . K. B. Rasmussen and S. \u010capkun, \"Realization of RF Distance Bounding,\" in Proc. of USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.04.014"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352566"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New York New York","acronym":"WiSec'15"},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":28,"alternative-id":["10.1145\/2766498.2766516","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766516","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}