{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:25:56Z","timestamp":1730298356615,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/sp.2018.00001","type":"proceedings-article","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T22:05:11Z","timestamp":1532642711000},"page":"549-566","source":"Crossref","is-referenced-by-count":27,"title":["Distance-Bounding Protocols: Verification Without Time and Location"],"prefix":"10.1109","author":[{"given":"Sjouke","family":"Mauw","sequence":"first","affiliation":[]},{"given":"Zach","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Toro-Pozo","sequence":"additional","affiliation":[]},{"given":"Rolando","family":"Trujillo-Rasua","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CSFW.1997.596782"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/978-3-642-41227-1_1"},{"key":"ref33","first-page":"78","article-title":"A novel RFID distance bounding protocol based on physically unclonable functions","volume":"7055","author":"kardas","year":"2012","journal-title":"RFIDSec Ser LNCS"},{"key":"ref32","first-page":"64","article-title":"Non-uniform stepping approach to RFID distance bounding problem","volume":"6514","author":"g\u00fcrel","year":"0","journal-title":"DPM'10\/SETOP'10 ser LNCS"},{"key":"ref31","first-page":"137","article-title":"Optimality results on the security of lookup-based protocols","author":"mauw","year":"2016","journal-title":"Radio Frequency Identification and IoT Security — 12th International Workshop RFIDSec 2016 Hong Kong China November 30 - December 2 2016 Revised Selected Papers"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1002\/wcm.590"},{"key":"ref37","first-page":"414","article-title":"Terrorism in distance bounding: Modeling terrorist-fraud resistance","author":"fischlin","year":"2013","journal-title":"Proceedings of the 11th International Conference on Applied Cryptography and Network Security ser ACNS'13 Berlin Heidelberg Springer-Verlag"},{"key":"ref36","first-page":"40","article-title":"Investigation of signal and message manipulations on the wireless channel","author":"p\u00f6pper","year":"2011","journal-title":"ESORICS'11"},{"key":"ref35","article-title":"Auto-matic analysis of distance bounding protocols","volume":"abs 1003 5383","author":"malladi","year":"2010","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TWC.2011.030411.101158"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SP.2012.17"},{"key":"ref40","first-page":"204","article-title":"Detecting relay attacks with timing-based protocols","author":"reid","year":"2007","journal-title":"Proceedings of the 2007 ACM Symposium on Information Computer and Communications Security ASIACCS 2007"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref12","article-title":"Towards secure distance bounding","volume":"8424","author":"boureanu","year":"2013","journal-title":"Fast Software Encryption-20th International Workshop FSE 2013"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CSF.2009.6"},{"key":"ref14","volume":"2283","author":"nipkow","year":"2002","journal-title":"Isabelle\/HOL - A Proof Assistant for Higher-Order Logic Ser LNCS"},{"key":"ref15","first-page":"696","article-title":"The TAMARIN prover for the symbolic analysis of security protocols","author":"meier","year":"2013","journal-title":"CAV '13"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CSFW.2001.930138"},{"key":"ref17","first-page":"414","article-title":"The Scyther tool: Verification, falsification, and analysis of security protocols","author":"cremers","year":"2008","journal-title":"CAV 08"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78636-8","author":"cremers","year":"2012","journal-title":"Operational Semantics and Verification of Security Protocols"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-03359-9_1"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/EuroSP.2016.19"},{"key":"ref4","first-page":"169","article-title":"Identification tokens - or: Solving the chess grandmaster problem","author":"beth","year":"1990","journal-title":"CRYPTO '90"},{"key":"ref27","first-page":"239","article-title":"The poulidor distance-bounding protocol","author":"trujillo-rasua","year":"2010","journal-title":"RFIDSec'10"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/BF00196726"},{"key":"ref6","first-page":"15","article-title":"Major security problems with the ‘unforgeable’ (feige)- fiat -shamir proofs of identity and how to overcome them","author":"desmedt","year":"1988","journal-title":"SecuriCom'88"},{"key":"ref29","first-page":"119","article-title":"RFID distance bounding protocol with mixed challenges to prevent relay attacks","author":"kim","year":"2009","journal-title":"CANS '09"},{"key":"ref5","first-page":"344","article-title":"Distance-bounding protocols","author":"brands","year":"1993","journal-title":"EUROCRYPT'93"},{"key":"ref8","first-page":"47","article-title":"A formal approach to distance-bounding RFID protocols","author":"d\u00fcrholz","year":"2011","journal-title":"Information Security 14th International Conference ISC 2011 Xi’ an China October 26–29 2011 Proceedings"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3233\/JCS-2010-0408"},{"key":"ref2","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proceedings of the Network and Distributed System Security Symposium NDSS 2011"},{"key":"ref9","first-page":"170","article-title":"Optimal proximity proofs","author":"boureanu","year":"2014","journal-title":"Information Security and Cryptology — 10th International Conference Inscrypt 2014"},{"key":"ref1","first-page":"21","article-title":"Special uses and abuses of the fiat -shamir passport protocol","author":"desmedt","year":"1987","journal-title":"CRYPTO 87"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SECURECOMM.2005.56"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/986858.986862"},{"key":"ref21","first-page":"389","article-title":"Realization of RF distance bounding","author":"rasmussen","year":"2010","journal-title":"USENIX Security'10"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-662-54455-6_6","article-title":"Beyond subterm-convergent equational theories in automated verification of stateful protocols","author":"dreier","year":"2017","journal-title":"4th International Conference on Principles of Security and Trust"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3052973.3053000"},{"key":"ref41","first-page":"98","article-title":"The swiss-knife RFID distance bounding protocol","author":"kim","year":"2008","journal-title":"Information Security and Cryptology - ICISC 2008 11th International Conference"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-0-387-46276-9_12"},{"key":"ref26","first-page":"250","article-title":"An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement","author":"avoine","year":"2009","journal-title":"ISC'09"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.3233\/JCS-140501"},{"key":"ref25","first-page":"189","article-title":"Relay cost bounding for contactless EMV payments","author":"chothia","year":"2015","journal-title":"Financial Cryptography and Data Security – 19th International Conference FC 2015"}],"event":{"name":"2018 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2018,5,20]]},"location":"San Francisco, CA","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8418581\/8418583\/08418584.pdf?arnumber=8418584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:04:08Z","timestamp":1643202248000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8418584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/sp.2018.00001","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}