C. Dimitrakakis and A. Mitrokotsa, Distance-bounding protocols: Are you close enough?, IEEE Security & Privacy, vol.13, issue.4, pp.47-51, 2015.
DOI : 10.1109/msp.2015.87

A. Mitrokotsa, Authentication in constrained settings, Cryptography and Information Security in the Balkans-First International Conference, pp.3-12, 2014.
DOI : 10.1007/978-3-319-21356-9_1

URL : http://www.cse.chalmers.se/%7Eaikmitr/papers/BalkanCryptSec14.pdf

C. Dimitrakakis, A. Mitrokotsa, and S. Vaudenay, Expected loss bounds for authentication in constrained channels, 2012.
DOI : 10.1109/infcom.2012.6195788

URL : http://infoscience.epfl.ch/record/174029/files/expected_loss.pdf

C. Dimitrakakis, A. Mitrokotsa, and S. Vaudenay, Expected loss analysis for authentication in constrained channels, Journal of Computer Security, vol.23, issue.3, pp.309-329, 2015.
DOI : 10.3233/jcs-140521

URL : https://infoscience.epfl.ch/record/210188/files/dimitrakakis-13-520.pdf

A. Mitrokotsa, P. Peris-lopez, C. Dimitrakakis, and S. Vaudenay, On selecting the nonce length in distance-bounding protocols, The Computer Journal, 2013.
DOI : 10.1093/comjnl/bxt033

URL : https://academic.oup.com/comjnl/article-pdf/56/10/1216/1426867/bxt033.pdf

A. Mitrokotsa, C. Onete, and S. Vaudenay, Location leakage in distance bounding: Why location privacy does not work, Computers & Security, vol.45, pp.199-209, 2014.
DOI : 10.1016/j.cose.2014.06.001

URL : https://eprint.iacr.org/2013/776.pdf

J. P. Aumasson, A. Mitrokotsa, and P. Peris-lopez, A note on a privacy-preserving distance-bounding protocol, Proceedings of the 13th International Conference on Information and Communications Security, pp.78-92, 2011.
DOI : 10.1007/978-3-642-25243-3_7

URL : http://www.lightweightcryptography.com/papers/Conferences/2011/Aumasson_ICICS2011.pdf

E. Pagnin, A. Yang, Q. Hu, G. Hancke, and A. Mitrokotsa, Distance bounding meets human based authentication, Future Generation Computer Systems, 2016.
DOI : 10.1016/j.future.2016.05.031

A. Mitrokotsa, C. Dimitrakakis, P. Peris-lopez, and J. C. Castro, Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels, IEEE Communications Letters, vol.14, issue.2, pp.121-123, 2010.

A. Bay, I. Boureanu, A. Mitrokotsa, I. Spulber, and S. Vaudenay, The bussardbagga and other distance bounding protocols under man-in-the-middle attacks, Proceedings of Inscrypt'2012, 8th China International Conference on Information Security and Cryptology, 2012.
DOI : 10.1007/978-3-642-38519-3_23

URL : http://infoscience.epfl.ch/record/181900/files/Bay_etal.pdf

A. Mitrokotsa, C. Onete, and S. Vaudenay, Mafia fraud attack against the rc distancebounding protocol, Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A), pp.74-79, 2012.
DOI : 10.1109/rfid-ta.2012.6404571

URL : https://infoscience.epfl.ch/record/181546/files/IEEERFIDTA.pdf

E. Pagnin, A. Yang, G. P. Hancke, and A. Mitrokotsa, Hb+db, mitigating man-inthe-middle attacks against HB+ with distance bounding, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, vol.3, pp.1-3, 2015.
DOI : 10.1145/2766498.2766516

I. Boureanu, A. Mitrokotsa, and S. Vaudenay, Practical and provably secure distancebounding, Journal of Computer Security, vol.23, issue.2, pp.229-257, 2015.

I. Boureanu, A. Mitrokotsa, and S. Vaudenay, Practical and provably secure distancebounding, Proceedings of the 16th Information Security Conference (ISC), 2013.

C. Karlsson and A. Mitrokotsa, Grouping-proof-distance-bounding protocols: Keep all your friends close, IEEE Communications Letters, vol.20, issue.7, pp.1365-1368, 2016.
DOI : 10.1109/lcomm.2016.2562618

E. Pagnin, G. Hancke, and A. Mitrokotsa, Using distance-bounding protocols to securely verify the proximity of two-hop neighbours, Communications Letters, vol.19, issue.7, pp.1173-1176, 2015.
DOI : 10.1109/lcomm.2015.2434373

URL : http://www.cse.chalmers.se/%7Eaikmitr/papers/twoHop.pdf

A. Mitrokotsa, C. Onete, E. Pagnin, and M. Perera, Multi-hop distance estimation: How far are you? Cryptology ePrint Archive, 2017.

C. H. Kim, G. Avoine, F. Koeune, F. X. Standaert, and O. Pereira, The swiss-knife RFID distance bounding protocol, Information Security and Cryptology-ICISC, pp.98-115, 2008.
DOI : 10.1007/978-3-642-00730-9_7

URL : http://www.avoine.net/rfid/download/papers/KimAKSP-2008-icisc.pdf

Y. J. Tu and S. Piramuthu, RFID Distance Bounding Protocols, Proc. of 1st Intern, 2007.

C. Y. Shih and P. J. Marrón, Cola: Complexity-reduced trilateration approach for 3d localization in wireless sensor networks, Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, pp.24-32, 2010.
DOI : 10.1109/sensorcomm.2010.11

C. Papamanthou, F. P. Preparata, and R. Tamassia, Algorithms for location estimation based on rssi sampling, Proceedings of Algorithmic Aspects of Wireless Sensor Networks, pp.72-86, 2008.
DOI : 10.1007/978-3-540-92862-1_7