000264822 001__ 264822
000264822 005__ 20190619220211.0
000264822 0247_ $$2doi$$a10.1145/3264628
000264822 037__ $$aCONF
000264822 245__ $$aSecurity of Distance-Bounding: A Survey
000264822 260__ $$c2018
000264822 269__ $$a2018
000264822 336__ $$aConference Papers
000264822 520__ $$aDistance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
000264822 700__ $$g149622$$aAvoine, Gildas$$0240944
000264822 700__ $$aBingöl, Muhammed Ali
000264822 700__ $$g210384$$aBoureanu, Ioana$$0245206
000264822 700__ $$g128436$$aCapkun, Srdan$$0244028
000264822 700__ $$aHancke, Gerhard
000264822 700__ $$aKardaş, Süleyman
000264822 700__ $$aKim, Chong Hee
000264822 700__ $$aLauradoux, Cédric
000264822 700__ $$g241224$$aBenjamin, Martin$$0247668
000264822 700__ $$aMunilla, Jorge
000264822 700__ $$aPeinado, Alberto
000264822 700__ $$aRasmussen, Kasper Bonne
000264822 700__ $$aSingelée, Dave
000264822 700__ $$0240963$$aTchamkerten, Aslan$$g106987
000264822 700__ $$aTrujillo-Rasua, Rolando
000264822 700__ $$0241950$$aVaudenay, Serge$$g131602
000264822 773__ $$tACM Computing Surveys$$j51$$k5$$q1-33
000264822 8560_ $$ffatih.balli@epfl.ch
000264822 8564_ $$uhttps://infoscience.epfl.ch/record/264822/files/article.pdf$$s907747
000264822 909C0 $$zGrolimund, Raphael$$xU10433$$pLASEC$$mfatih.balli@epfl.ch$$0252183
000264822 909CO $$qGLOBAL_SET$$pconf$$pIC$$ooai:infoscience.epfl.ch:264822
000264822 960__ $$afatih.balli@epfl.ch
000264822 961__ $$afantin.reichler@epfl.ch
000264822 973__ $$aEPFL$$rREVIEWED
000264822 980__ $$aCONF
000264822 981__ $$aoverwrite