暂无分享,去创建一个
[1] Laurent Bussard,et al. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks , 2005, SEC.
[2] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[3] H. Chernoff. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .
[4] Bart Preneel,et al. Distance Bounding in Noisy Environments , 2007, ESAS.
[5] Julio C. Hernandez-Castro,et al. Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks , 2009 .
[6] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[8] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[9] Gildas Avoine,et al. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks , 2009, CANS.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] M. Degroot. Optimal Statistical Decisions , 1970 .
[12] Cédric Lauradoux,et al. Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[13] Serge Vaudenay,et al. Distinguishing Distributions Using Chernoff Information , 2010, ProvSec.
[14] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[15] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[16] Faculteit Ingenieurswetenschappen. Study and Design of a Security Architecture for Wireless Personal Area Networks , 2008 .
[17] William Stallings,et al. Cryptography and network security , 1998 .
[18] H. Chernoff. Sequential Design of Experiments , 1959 .
[19] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[20] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[21] Srdjan Capkun,et al. ID-Based Secure Distance Bounding and Localization , 2009, ESORICS.