Author:
Bussard Laurent,Bagga Walid
Reference17 articles.
1. A. Alkassar and C. Stuble. Towards secure iff: preventing mafia fraud attacks. In Proceedings of MILCOM 2002, volume 2, pages 1139–1144, October 2002.
2. Ross Anderson. Security Engineering: A Guide to Building Dependable distributed Systems. John Wiley and Sons, 2001.
3. S. Bengio, G. Brassard, Y. Desmedt, C. Goutier, and J.J. Quisquater. Secure implementation of identification systems. Journal of Cryptology, 4(3):175–183, 1991.
4. S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In Proceedings of EUROCRYPT 93, volume 765 of LNCS, pages 23–27. Springer-Verlag, May 1993.
5. L. Bussard and Y. Roudier. Embedding distance-bounding protocols within intuitive interactions. In Proceedings of Conference on Security in Pervasive Computing (SPC’2003), LNCS. Springer, 2003.
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献