Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Communications in Computer and Information Science;A Ahmadi,2018
2. Ahmadi, H., Safavi-Naini, R.: Secure distance bounding verification using physical-channel properties. CoRR abs/1303.0346 (2013)
3. Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. 51, 1–33 (2017)
4. Avoine, G., et al.: A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol. In: Proceedings of ASIA CCS ’17, pp. 800–814. ACM (2017)
5. Avoine, G., Lauradoux, C., Martin, B.: How secret-sharing can defeat terrorist fraud. In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec ’11, pp. 145–156. ACM, New York (2011)