Author:
Kuhn Marc,Luecken Heinrich,Tippenhauer Nils Ole
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. G2Auth;Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services;2022-06-27
2. Defining Secure Areas for TDOA-Enhanced Non-Ideal Distance Bounding;2022 International Wireless Communications and Mobile Computing (IWCMC);2022-05-30
3. Crypto-Chain: A Relay Resilience Framework for Smart Vehicles;Annual Computer Security Applications Conference;2021-12-06
4. A new secure authentication based distance bounding protocol;PeerJ Computer Science;2021-05-06
5. A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme;Security and Communication Networks;2021-03-08