E. Bangerter, M. Djackov, and A. Sadeghi, A Demonstrative Ad Hoc Attestation System, Information Security, pp.17-30, 2008.
DOI : 10.1007/978-3-540-85886-7_2

S. Brands and D. Chaum, Distance-Bounding Protocols, Advances in Cryptology ? EUROCRYPT '93, pp.344-359, 1994.
DOI : 10.1007/3-540-48285-7_30

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720

L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, Practical nfc peerto-peer relay attack using mobile phones, 2010.
DOI : 10.1007/978-3-642-16822-2_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.1413

S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. Van-doorn et al., Trustworthy and personalized computing on public kiosks, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.199-210, 2008.
DOI : 10.1145/1378600.1378623

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7867

C. Kim, G. Avoine, F. Koeune, F. Standaert, and O. Pereira, The Swiss-Knife RFID Distance Bounding Protocol, Information Security and Cryptology ? ICISC, pp.98-115, 2008.
DOI : 10.1007/978-3-540-73275-4_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.565.8577

J. M. Mccune, A. Perrig, and M. K. Reiter, Seeing-Is-Believing: using camera phones for human-verifiable authentication, International Journal of Security and Networks, vol.4, issue.1/2, pp.43-56, 2009.
DOI : 10.1504/IJSN.2009.023425

A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters, Securing a Remote Terminal Application with a Mobile Trusted Device, 20th Annual Computer Security Applications Conference, pp.438-447, 2004.
DOI : 10.1109/CSAC.2004.33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.1393

B. Parno, Bootstrapping trust in a " trusted " platform, Proceedings of the 3rd conference on Hot topics in security, pp.1-9, 2008.

N. P. Smart, Cryptography, An Introduction, 2011.

F. Stumpf, O. Tafreschi, P. Röder, and C. Eckert, A robust integrity reporting protocol for remote attestation, Second Workshop on Advances in Trusted Computing (WATC '06 Fall), pp.25-36, 2006.

R. Toegl and M. Hutter, An approach to introducing locality in remote attestation using near field communications, The Journal of Supercomputing, vol.55, issue.2, pp.207-227, 2011.
DOI : 10.1007/s11227-010-0407-1