Author:
Avoine Gildas,Lauradoux Cédric,Martin Benjamin
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models;Financial Cryptography and Data Security;2021
2. Post-Collusion Security and Distance Bounding;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019-11-06
3. Security of Distance-Bounding;ACM Computing Surveys;2019-09-30
4. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol;Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security;2017-04-02
5. Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?;Radio Frequency Identification and IoT Security;2017