1. Lecture Notes in Computer Science;N Chandran,2009
2. Naveen, S., Umesh, S., David, W.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 1–10. ACM (2003)
3. Dave, S., Bart, P.: Location verification using secure distance bounding protocols. In: 2005 IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 7. IEEE (2005)
4. Laurent, B.: Trust Establishment Protocols for Communicating Devices. Ph.D. thesis, Eurecom-ENST (2004)
5. Capkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings of IEEE INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1917–1928. IEEE (2005)