Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,807,820 papers from all fields of science
Search
Sign In
Create Free Account
Distance-bounding protocol
Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Challenge–response authentication
Radio frequency
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Energy-Efficient Distance-Bounding with Residual Charge Computation
Yunhui Zhuang
,
Anjia Yang
,
G. Hancke
,
D. Wong
,
Guomin Yang
IEEE Transactions on Emerging Topics in Computing
2020
Corpus ID: 58219426
Real-time location systems are often required in industrial applications. In addition to securely determining an item's location…
Expand
2019
2019
Security Implications of Implementing Multistate Distance-Bounding Protocols
Jingyi Zhang
,
Anjia Yang
,
Qiao Hu
,
G. Hancke
CPS-SPC@CCS
2019
Corpus ID: 207958897
A number of distance-bounding protocols have proposed multistate exchanges. In theory this can potentially improve the security…
Expand
2017
2017
A Novel Multi-Hop Distance-Bounding Protocol Used in Wireless Sensor Networks
Hanguang Luo
,
Jian Su
,
G. Wen
Global Communications Conference
2017
Corpus ID: 13576370
Distance bounding(DB) protocol is a critical solution to preventing distance attacks. Since the traditional DB protocols can only…
Expand
2017
2017
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
R. Peeters
,
J. Hermans
,
Aysajan Abidin
IACR Cryptology ePrint Archive
2017
Corpus ID: 42343514
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and…
Expand
2014
2014
Vssdb: A Verifiable Secret-Sharing Distance-Bounding Protocol
S. Gambs
,
M. Killijian
,
C. Lauradoux
,
Cristina Onete
,
Matthieu Roy
,
Moussa Traoré
2014
Corpus ID: 12115807
Terrorist fraud is a class of relay attacks against distance-bounding (DB) protocols in which a distant malicious prover colludes…
Expand
2013
2013
Secure & Lightweight Distance-Bounding
Ioana Boureanu
,
Aikaterini Mitrokotsa
,
S. Vaudenay
2013
Corpus ID: 15295827
Distance-bounding is a practical solution aiming to prevent relay attacks. The main challenge when designing such protocols is…
Expand
Review
2013
Review
2013
On the Need for Secure Distance-Bounding
Ioana Boureanu
,
Aikaterini Mitrokotsa
,
S. Vaudenay
Annual International Cryptology Conference
2013
Corpus ID: 18135550
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle…
Expand
2010
2010
An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks
Chang-Hee Boo
,
Moon-seog Jun
2010
Corpus ID: 106493771
RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from…
Expand
2010
2010
ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL
V. Nikov
,
M. Vauclair
2010
Corpus ID: 96454202
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known asmafia…
Expand
2008
2008
Yet Another Secure Distance-Bounding Protocol
V. Nikov
,
M. Vauclair
International Conference on Security and…
2008
Corpus ID: 540756
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE