Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, Advances in Cryptology ? EUROCRYPT 2003, pp.614-629, 2003. ,
DOI : 10.1007/3-540-39200-9_38
Secure implementation of identification systems, Journal of Cryptology, vol.4, issue.3, pp.175-183, 1991. ,
DOI : 10.1007/BF00196726
Distance-Bounding Protocols, Proc. of Advances in Cryptology ? EURO- CRYPT'93, pp.344-359, 1993. ,
DOI : 10.1007/3-540-48285-7_30
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, pp.121-133, 2016. ,
DOI : 10.1145/2939918.2939919
URL : https://hal.archives-ouvertes.fr/hal-01510800
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance, Proceedings of ACNS 2013, pp.414-431, 2013. ,
DOI : 10.1007/978-3-642-38980-1_26
Prover anonymous and deniable distance-bounding authentication, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.501-506, 2014. ,
DOI : 10.1145/2590296.2590331
URL : https://hal.archives-ouvertes.fr/hal-01089793
Efficient, secure, private distance bounding without key updates, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.207-218, 2013. ,
DOI : 10.1145/2462096.2462129
URL : https://www.cosic.esat.kuleuven.be/publications/article-2310.pdf
The Swiss-Knife RFID Distance Bounding Protocol, Information Security and Cryptology (ICISC) 2008, pp.98-115, 2008. ,
DOI : 10.1007/978-3-540-73275-4_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.565.8577
Proof of proximity of knowledge. Cryptology ePrint Archive, 2014. ,