1. Brands, S., Chaum, D.: Distance-bounding protocol. In: Advances in Cryptology-EUROCRYPT 93. LNCS, vol. 765, January 2010
2. Cho, W., Seo, M., Hoon, M., Lee, D.: Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system. J. Adv. Transp. 2018 (2018). Article ID 1935974
3. Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of the USENIX Security (2007)
4. Hamida, S., Thevenon, P., Pierrot, J., Savry, O., Castelluccia, C.: Detecting relay attacks in RFID systems using physical layer characteristics. In: Wireless and Mobile Networking Conference (WMNC) (2013)
5. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: IEEE/Create Net Secure Communication (2005)