{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T05:57:25Z","timestamp":1648706245442},"reference-count":9,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2012]]},"DOI":"10.1587\/transinf.e95.d.1155","type":"journal-article","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:19:09Z","timestamp":1333340349000},"page":"1155-1158","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight Distance Bounding Protocol against Relay Attacks"],"prefix":"10.1587","volume":"E95.D","author":[{"given":"Jin Seok","family":"KIM","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, POSTECH"}]},{"given":"Kookrae","family":"CHO","sequence":"additional","affiliation":[{"name":"Division of IT-Convergence"}]},{"given":"Dae Hyun","family":"YUM","sequence":"additional","affiliation":[{"name":"Educational Institute of Future Information Technology, POSTECH"}]},{"given":"Sung Je","family":"HONG","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, POSTECH"}]},{"given":"Pil Joong","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, POSTECH"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] ISO\/IEC 9798-1: 2010, “Information technology-Security techniques-Entity authentication-Part 1: General,” 2010."},{"key":"2","unstructured":"[2] ISO\/IEC 9798-4: 1999, “Information technology-Security techniques-Entity authentication-Part 4: Mechanisms using a cryptographic check function,” 1999."},{"key":"3","unstructured":"[3] G.P. Hancke and M.G. Kuhn, “An RFID distance bounding protocol,” SECURECOMM, pp.67-73, IEEE Computer Society, 2005."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] S. Brands and D. Chaum, “Distance-bounding protocols,” EUROCRYPT, Lect. Notes Comput. Sci., vol.765, pp.344-359, Springer, 1993.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Y. Desmedt, C. Goutier, and S. Bengio, “Special uses and abuses of the Fiat-Shamir passport protocol,” CRYPTO, Lect. Notes Comput. Sci., vol.293, pp.21-39, Springer, 1987.","DOI":"10.1007\/3-540-48184-2_3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120610.100491"},{"key":"7","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-642-10433-6_9","volume":"5888","author":"KIM CHONG HEE","year":"2009","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"8","unstructured":"[8] C.H. Kim, G. Avoine, F. Koeune, F.X. Standaert, and O. Pereira, “The swiss-knife RFID distance bounding protocol,” ICISC, Lect. Notes Comput. Sci., vol.5461, pp.98-115, Springer, 2008."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] R. Trujillo-Rasua, B. Martin, and G. Avoine, “The Poulidor distance-bounding protocol,” Workshop on RFID Security-RFIDSec'10, 2010.","DOI":"10.1007\/978-3-642-16822-2_19"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/4\/E95.D_4_1155\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:34:57Z","timestamp":1619418897000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/4\/E95.D_4_1155\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.e95.d.1155","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}