{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:00Z","timestamp":1750306380811,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T00:00:00Z","timestamp":1468800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC Discovery and Accelerator Supplement grants"},{"name":"European Union through the European Regional Development Fund"},{"name":"University of Auvergne Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,18]]},"DOI":"10.1145\/2939918.2939919","type":"proceedings-article","created":{"date-parts":[[2016,7,15]],"date-time":"2016-07-15T18:37:18Z","timestamp":1468607838000},"page":"121-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol"],"prefix":"10.1145","author":[{"given":"Xavier","family":"Bultel","sequence":"first","affiliation":[{"name":"University Clermont Auvergne, Clermont-Ferrand, France"}]},{"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[{"name":"UQAM, Montr\u00e9al, PQ, Canada"}]},{"given":"David","family":"G\u00e9rault","sequence":"additional","affiliation":[{"name":"University Clermont Auvergne, Clermont-Ferrand, France"}]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[{"name":"University Clermont Auvergne, Clermont-Ferrand, France"}]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[{"name":"INSA\/IRISA, Rennes, France"}]},{"given":"Jean-Marc","family":"Robert","sequence":"additional","affiliation":[{"name":"ETS, Montr\u00e9al, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21966-0_6"},{"key":"e_1_3_2_1_2_1","volume-title":"A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security, 19(2):289--317","author":"Avoine G.","year":"2010","unstructured":"G. Avoine , M. Ali Bing\u00f6l , S. Karda , C\u015f. Lauradoux , and B. Martin . A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security, 19(2):289--317 , 2010 . G. Avoine, M. Ali Bing\u00f6l, S. Karda, C\u015f. Lauradoux, and B. Martin. A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security, 19(2):289--317, 2010."},{"key":"e_1_3_2_1_3_1","first-page":"371","volume-title":"Inscrypt","author":"Bay A.","year":"2012","unstructured":"A. Bay , Boureanu I, A. Mitrokotsa , I. Spulber , and S. Vaudenay . The Bussard-Bagga and other distance-bounding protocols under attacks . In Inscrypt 2012 , LNCS 7763, pages 371 -- 391 . Springer , 2012. A. Bay, Boureanu I, A. Mitrokotsa, I. Spulber, and S. Vaudenay. The Bussard-Bagga and other distance-bounding protocols under attacks. In Inscrypt 2012, LNCS 7763, pages 371--391. Springer, 2012."},{"key":"e_1_3_2_1_4_1","first-page":"259","volume-title":"EUROCRYPT 2000","author":"Bellare M.","year":"1807","unstructured":"M. Bellare , A. Boldyreva , and S. Micali . Public-key encryption in a multi-user setting: Security proofs and improvements . In EUROCRYPT 2000 , LNCS 1807 , pages 259 -- 274 , 2000. M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting: Security proofs and improvements. In EUROCRYPT 2000, LNCS 1807, pages 259--274, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766225"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196726"},{"key":"e_1_3_2_1_7_1","first-page":"97","volume-title":"LightSec","author":"Boureanu I.","year":"2013","unstructured":"I. Boureanu , A. Mitrokotsa , and S. Vaudenay . Secure and lightweight distance-bounding . In LightSec 2013 , LNCS 8162, pages 97 -- 113 . Springer , 2013. I. Boureanu, A. Mitrokotsa, and S. Vaudenay. Secure and lightweight distance-bounding. In LightSec 2013, LNCS 8162, pages 97--113. Springer, 2013."},{"key":"e_1_3_2_1_8_1","first-page":"344","volume-title":"EUROCRYP '93","author":"Brands S.","year":"1993","unstructured":"S. Brands and D. Chaum . Distance-bounding protocols . In EUROCRYP '93 , LNCS 765, pages 344 -- 359 . Springer , 1993 . S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYP '93, LNCS 765, pages 344--359. Springer, 1993."},{"key":"e_1_3_2_1_9_1","first-page":"29","volume-title":"FPS 2015","author":"Brelurut A.","year":"2015","unstructured":"A. Brelurut , D. G\u00e9rault , and P. Lafourcade . Survey of distance bounding protocols and threats . In FPS 2015 , LNCS 9482, pages 29 -- 49 . Springer , 2015 . A. Brelurut, D. G\u00e9rault, and P. Lafourcade. Survey of distance bounding protocols and threats. In FPS 2015, LNCS 9482, pages 29--49. Springer, 2015."},{"key":"e_1_3_2_1_10_1","first-page":"222","volume-title":"Security and Privacy in the Age of Ubiquitous Computing, IFIP","author":"Bussard L.","year":"2005","unstructured":"L. Bussard and W. Bagga . Distance-bounding proof of knowledge to avoid real-time attacks . In Security and Privacy in the Age of Ubiquitous Computing, IFIP , pages 222 -- 238 . Springer , 2005 . L. Bussard and W. Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In Security and Privacy in the Age of Ubiquitous Computing, IFIP, pages 222--238. Springer, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646752.704723"},{"key":"e_1_3_2_1_13_1","first-page":"47","volume-title":"Information Security, LNCS 7001","author":"Drh\u00fcolz U.","year":"2011","unstructured":"U. Drh\u00fcolz , M. Fischlin , M. Kasper , and C. Onete . A formal approach to distance-bounding RFID protocols . In Information Security, LNCS 7001 , pages 47 -- 62 . Springer , 2011 . U. Drh\u00fcolz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance-bounding RFID protocols. In Information Security, LNCS 7001, pages 47--62. Springer, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462128"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590331"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041266"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462129"},{"key":"e_1_3_2_1_20_1","first-page":"98","volume-title":"ICISC 2008","author":"Kim C. H.","year":"2008","unstructured":"C. H. Kim , G. Avoine , F. Koeune , F.-X. Standaert , and O. Pereira . The Swiss-Knife RFID distance bounding protocol . In ICISC 2008 , LNCS 5461, pages 98 -- 115 . Springer , 2008 . C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID distance bounding protocol. In ICISC 2008, LNCS 5461, pages 98--115. Springer, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"The Art of Computer Programming: Fundamental Algorithms","author":"Knuth D. E.","year":"1997","unstructured":"D. E. Knuth . The Art of Computer Programming: Fundamental Algorithms , 3 rd ed. Addison Wesley , 1997 . D. E. Knuth. The Art of Computer Programming: Fundamental Algorithms, 3rd ed. Addison Wesley, 1997.","edition":"3"},{"key":"e_1_3_2_1_22_1","volume-title":"Concrete mathematics","author":"Knuth D. E.","year":"1994","unstructured":"D. E. Knuth , R. L. Graham , and O. Patashnik . Concrete mathematics , 2 nd ed. Adison Wesley , 1994 . D. E. Knuth, R. L. Graham, and O. Patashnik. Concrete mathematics, 2nd ed. Adison Wesley, 1994.","edition":"2"},{"key":"e_1_3_2_1_23_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard S.","year":"2008","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power analysis attacks: Revealing the secrets of smart cards . Springer Science & Business Media , 2008 . S. Mangard, E. Oswald, and T. Popp. Power analysis attacks: Revealing the secrets of smart cards. Springer Science & Business Media, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217025"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_26"},{"key":"e_1_3_2_1_26_1","volume-title":"Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint 2004\/332","author":"Shoup V.","year":"2004","unstructured":"V. Shoup . Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint 2004\/332 , 2004 . V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint 2004\/332, 2004."},{"key":"e_1_3_2_1_27_1","volume-title":"Cryptology ePrint 2014\/695","author":"Vaudenay S.","year":"2014","unstructured":"S. Vaudenay . Proof of proximity of knowledge. Cryptology ePrint 2014\/695 , 2014 . S. Vaudenay. Proof of proximity of knowledge. Cryptology ePrint 2014\/695, 2014."},{"key":"e_1_3_2_1_28_1","first-page":"207","volume-title":"Private and secure public-key distance bounding","author":"Vaudenay S.","year":"2015","unstructured":"S. Vaudenay . Private and secure public-key distance bounding ; application to NFC payment. In Financial Cryptography, LNCS 8975, pages 207 -- 216 . Springer , 2015 . S. Vaudenay. Private and secure public-key distance bounding; application to NFC payment. In Financial Cryptography, LNCS 8975, pages 207--216. Springer, 2015."},{"key":"e_1_3_2_1_29_1","first-page":"68","volume-title":"Proc. of Advances in Cryptology -- Asiacrypt'07, LNCS 4883","author":"Vaudenay Serge","year":"2007","unstructured":"Serge Vaudenay . On privacy models for RFID . In Proc. of Advances in Cryptology -- Asiacrypt'07, LNCS 4883 , pages 68 -- 87 . Springer , 2007 Serge Vaudenay. On privacy models for RFID. In Proc. of Advances in Cryptology -- Asiacrypt'07, LNCS 4883, pages 68--87. Springer, 2007"}],"event":{"name":"WiSec'16: 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Darmstadt Germany","acronym":"WiSec'16"},"container-title":["Proceedings of the 9th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2939918.2939919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2939918.2939919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:00Z","timestamp":1750223220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2939918.2939919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":29,"alternative-id":["10.1145\/2939918.2939919","10.1145\/2939918"],"URL":"https:\/\/doi.org\/10.1145\/2939918.2939919","relation":{},"subject":[],"published":{"date-parts":[[2016,7,18]]},"assertion":[{"value":"2016-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}