M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

G. Avoine, Security of Distance-Bounding: A Survey, ACM Comput. Surv, vol.51, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02470057

G. Avoine, M. A. Bingöl, S. Kardas, C. Lauradoux, and B. Martin, A framework for analyzing RFID distance bounding protocols, Journal of Computer Security, vol.19, pp.289-317, 2011.

G. Avoine, X. Bultel, S. Gambs, D. Gerault, P. Lafourcade et al., A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol, Proc. 12th ACM Asia Conference on Computer and Communications Security, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01588560

G. Avoine and A. Tchamkerten, An efficient distance bounding RFID authentication protocol: balancing falseacceptance rate and memory requirement, International Conference on Information Security, pp.250-261, 2009.

D. Basin, S. Capkun, P. Schaller, and B. Schmidt, Formal reasoning about physical properties of security protocols, ACM Transactions on Information and System Security (TISSEC), vol.14, p.16, 2011.

D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse et al., A Formal Analysis of 5G Authentication, 25th ACM Conference on Computer and Communications Security (CCS'18), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898050

K. Bhargavan, B. Blanchet, and N. Kobeissi, Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, IEEE Symposium on Security and Privacy (S&P'17), pp.483-503, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575920

B. Blanchet, An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, Proc. 14th Computer Security Foundations Workshop (CSFW'01), pp.82-96, 2001.

B. Blanchet, Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

B. Blanchet, Symbolic and computational mechanized verification of the ARINC823 avionic protocols, 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, pp.68-82, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575861

I. Boureanu, T. Chothia, A. Debant, and S. Delaune, Security Analysis and Implementation of Relay-Resistant Contactless Payments, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02917076

I. Boureanu, A. Mitrokotsa, and S. Vaudenay, Secure and lightweight distance-bounding, International Workshop on Lightweight Cryptography for Security and Privacy, pp.97-113, 2013.

S. Brands and D. Chaum, Distance-bounding protocols, Workshop on the Theory and Application of of Cryptographic Techniques, pp.344-359, 1993.

X. Bultel, S. Gambs, D. Gerault, P. Lafourcade, C. Onete et al., A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol, Proc. 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (WISEC'16), pp.121-133, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01510800

S. ?apkun, L. Buttyán, and J. Hubaux, SECTOR: secure tracking of node encounters in multi-hop wireless networks, Proc. 1st ACM workshop on Security of ad hoc and sensor networks, pp.21-32, 2003.

R. Chadha, A. P. Sistla, and M. Viswanathan, Verification of randomized security protocols, Proc. 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (LICS'17), pp.1-12, 2017.

T. Chothia, J. De-ruiter, and B. Smyth, Modelling and Analysis of a Hierarchy of Distance Bounding Attacks, Proc. 27th USENIX Security Symposium, 2018.

T. Chothia, F. D. Garcia, J. De-ruiter, J. Van-den-breekel, and M. Thompson, Relay Cost Bounding for Contactless EMV Payments, Proc. 19th International Conference on Financial Cryptography and Data Security (FC'15), vol.8975, 2015.

V. Cortier, A. Filipiak, and J. Lallemand, BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, pp.367-36714, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02126077

V. Cortier, D. Galindo, and M. Turuani, A formal analysis of the Neuchâtel e-voting protocol, 3rd IEEE European Symposium on Security and Privacy (EuroSP'18), pp.430-442, 2018.

C. Cremers, K. Rasmussen, B. Schmidt, and S. Capkun, Distance hijacking attacks on distance bounding protocols, Proc. IEEE Symposium on Security and Privacy (S&P'12), pp.113-127, 2012.

A. Debant and S. Delaune, Symbolic verification of distance bounding protocols, Proc. 8th International Conference on Principles of Security and Trust (POST'19) (LNCS), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02018280

A. Debant, S. Delaune, and C. Wiedling, A Symbolic Framework to Analyse Physical Proximity in Security Protocols, Proc. 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, (FSTTCS'18) (LIPIcs), vol.122, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02390222

A. Debant, S. Delaune, and C. Wiedling, Symbolic analysis of terrorist fraud resistance, ESORICS'19, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02171218

Y. Desmedt, Major security problems with the 'unforgeable'(Feige)-Fiat-Shamir proofs of identity and how to overcome them, Proceedings of SECURICOM, vol.88, pp.15-17, 1988.

Y. Desmedt, C. Goutier, and S. Bengio, Special uses and abuses of the Fiat-Shamir passport protocol, Conference on the Theory and Application of Cryptographic Techniques, pp.21-39, 1987.

D. Dolev and A. C. Yao, On the Security of Public Key Protocols, Proc. 22nd Symposium on Foundations of Computer Science (FCS'81), pp.350-357, 1981.

J. Dreier, L. Hirschi, S. Radomirovic, and R. Sasse, Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR, CSF'2018 -31st IEEE Computer Security Foundations Symposium, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780603

S. Drimer and S. Murdoch, Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks, 2007.

, USENIX security symposium, vol.312

U. Dürholz, M. Fischlin, M. Kasper, and C. Onete, A Formal Approach to Distance-Bounding RFID Protocols, Proc. 14th International Conference on Information Security (ISC'11), vol.7001, 2011.

. Emvco, EMV Contactless Specifications for Payment Systems, version 2.6, 2016.

M. Fischlin and C. Onete, Subtle kinks in distance-bounding: an analysis of prominent protocols, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.195-206, 2013.

A. Francillon, B. Danev, and S. Capkun, Relay attacks on passive keyless entry and start systems in modern cars, Proceedings of the Network and Distributed System Security Symposium (NDSS). Eidgenössische Technische Hochschule Zürich, 2011.

D. Gerault, Security Analysis of Contactless Communication Protocols, 2018.
URL : https://hal.archives-ouvertes.fr/tel-02536478

G. Girol, L. Hirschi, R. Sasse, D. Jackson, C. Cremers et al.,

, A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols, USENIX Security Symposium'20

L. Hirschi and C. Cremers, Improving automated symbolic analysis of ballot secrecy for e-voting protocols: A method based on sufficient conditions, IEEE European Symposium on Security and Privacy (EuroS&P'19), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02368857

P. Janssens, Proximity check for communication devices, US Patent, vol.9, p.228, 2017.

H. Kilinç and S. Vaudenay, Efficient Public-Key Distance Bounding Protocol, Advances in Cryptology -ASI-ACRYPT 2016 -22nd International Conference on the Theory and Application of Cryptology and Information Security, vol.10032, pp.873-901, 2016.

C. Kim, G. Avoine, F. Koeune, F. Standaert, and O. Pereira, The Swiss-Knife RFID Distance Bounding Protocol, Proc. 11th International Conference on Information Security and Cryptology (ICISC'08), vol.5461, 2008.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.435-450, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575923

S. Mauw, Z. Smith, J. Toro-pozo, and R. Trujillo-rasua, Distance-Bounding Protocols: Verification without Time and Location, Proc. 39th IEEE Symposium on Security and Privacy (S&P'18, pp.152-169, 2018.

S. Mauw, Z. Smith, J. Toro-pozo, and R. Trujillo-rasua, Post-Collusion Security and Distance Bounding, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.

S. Mauw, J. Toro-pozo, and R. Trujillo-rasua, A class of precomputation-based distance-bounding protocols, Proc. 1st IEEE European Symposium on Security and Privacy (EuroS&P'16), 2016.

C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson, Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure localization and time synchronization for wireless sensor and ad hoc networks, pp.279-298, 2007.

S. Meier, B. Schmidt, C. Cremers, and D. Basin, The Tamarin Prover for the Symbolic Analysis of Security Protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13) (LNCS), 2013.

J. Mitchell, A. Scedrov, N. Durgin, and P. Lincoln, Undecidability of bounded security protocols, Workshop on Formal Methods and Security Protocols, 1999.

J. Munilla and A. Peinado, Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels, Wireless communications and mobile computing, vol.8, pp.1227-1232, 2008.

V. Nigam, C. Talcott, and A. A. Urquiza, Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders, Proc. 21st European Symposium on Research in Computer Security (ESORICS'16), pp.450-470, 2016.