Distance-bounding protocols: Are you close enough?, IEEE Security & Privacy, vol.13, issue.4, pp.47-51, 2015. ,
DOI : 10.1109/msp.2015.87
Authentication in constrained settings, Cryptography and Information Security in the Balkans-First International Conference, pp.3-12, 2014. ,
DOI : 10.1007/978-3-319-21356-9_1
URL : http://www.cse.chalmers.se/%7Eaikmitr/papers/BalkanCryptSec14.pdf
Expected loss bounds for authentication in constrained channels, 2012. ,
DOI : 10.1109/infcom.2012.6195788
URL : http://infoscience.epfl.ch/record/174029/files/expected_loss.pdf
Expected loss analysis for authentication in constrained channels, Journal of Computer Security, vol.23, issue.3, pp.309-329, 2015. ,
DOI : 10.3233/jcs-140521
URL : https://infoscience.epfl.ch/record/210188/files/dimitrakakis-13-520.pdf
On selecting the nonce length in distance-bounding protocols, The Computer Journal, 2013. ,
DOI : 10.1093/comjnl/bxt033
URL : https://academic.oup.com/comjnl/article-pdf/56/10/1216/1426867/bxt033.pdf
Location leakage in distance bounding: Why location privacy does not work, Computers & Security, vol.45, pp.199-209, 2014. ,
DOI : 10.1016/j.cose.2014.06.001
URL : https://eprint.iacr.org/2013/776.pdf
A note on a privacy-preserving distance-bounding protocol, Proceedings of the 13th International Conference on Information and Communications Security, pp.78-92, 2011. ,
DOI : 10.1007/978-3-642-25243-3_7
URL : http://www.lightweightcryptography.com/papers/Conferences/2011/Aumasson_ICICS2011.pdf
Distance bounding meets human based authentication, Future Generation Computer Systems, 2016. ,
DOI : 10.1016/j.future.2016.05.031
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels, IEEE Communications Letters, vol.14, issue.2, pp.121-123, 2010. ,
The bussardbagga and other distance bounding protocols under man-in-the-middle attacks, Proceedings of Inscrypt'2012, 8th China International Conference on Information Security and Cryptology, 2012. ,
DOI : 10.1007/978-3-642-38519-3_23
URL : http://infoscience.epfl.ch/record/181900/files/Bay_etal.pdf
Mafia fraud attack against the rc distancebounding protocol, Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A), pp.74-79, 2012. ,
DOI : 10.1109/rfid-ta.2012.6404571
URL : https://infoscience.epfl.ch/record/181546/files/IEEERFIDTA.pdf
Hb+db, mitigating man-inthe-middle attacks against HB+ with distance bounding, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, vol.3, pp.1-3, 2015. ,
DOI : 10.1145/2766498.2766516
Practical and provably secure distancebounding, Journal of Computer Security, vol.23, issue.2, pp.229-257, 2015. ,
Practical and provably secure distancebounding, Proceedings of the 16th Information Security Conference (ISC), 2013. ,
Grouping-proof-distance-bounding protocols: Keep all your friends close, IEEE Communications Letters, vol.20, issue.7, pp.1365-1368, 2016. ,
DOI : 10.1109/lcomm.2016.2562618
Using distance-bounding protocols to securely verify the proximity of two-hop neighbours, Communications Letters, vol.19, issue.7, pp.1173-1176, 2015. ,
DOI : 10.1109/lcomm.2015.2434373
URL : http://www.cse.chalmers.se/%7Eaikmitr/papers/twoHop.pdf
Multi-hop distance estimation: How far are you? Cryptology ePrint Archive, 2017. ,
The swiss-knife RFID distance bounding protocol, Information Security and Cryptology-ICISC, pp.98-115, 2008. ,
DOI : 10.1007/978-3-642-00730-9_7
URL : http://www.avoine.net/rfid/download/papers/KimAKSP-2008-icisc.pdf
RFID Distance Bounding Protocols, Proc. of 1st Intern, 2007. ,
Cola: Complexity-reduced trilateration approach for 3d localization in wireless sensor networks, Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, pp.24-32, 2010. ,
DOI : 10.1109/sensorcomm.2010.11
Algorithms for location estimation based on rssi sampling, Proceedings of Algorithmic Aspects of Wireless Sensor Networks, pp.72-86, 2008. ,
DOI : 10.1007/978-3-540-92862-1_7