Author:
Avoine Gildas,Floerkemeier Christian,Martin Benjamin
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Lecture Notes in Computer Science;G. Avoine,2009
2. Lecture Notes in Computer Science;S. Brands,1994
3. Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: SEC, pp. 223–238 (2005)
4. Lecture Notes in Computer Science;Y. Desmedt,1988
5. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm 2005, Athens, Greece. IEEE, Los Alamitos (2005)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献