{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:23:43Z","timestamp":1725614623007},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/netsys.2015.7089068","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T16:32:28Z","timestamp":1429720348000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions"],"prefix":"10.1109","author":[{"given":"Stephan","family":"Kleber","sequence":"first","affiliation":[]},{"given":"Rens W.","family":"van der Heijden","sequence":"additional","affiliation":[]},{"given":"Henning","family":"Kopp","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368352"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462129"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1145\/1229285.1229314","article-title":"Detecting Relay Attacks with Timing-based Protocols","author":"reid","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28540-0_24","article-title":"A Formal Definition and a New Security Mechanism of Physical Unclonable Functions","author":"plaga","year":"2012","journal-title":"Measurement Modelling and Evaluation of Computing Systems and Dependability and Fault Tolerance"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"article-title":"On the Foundations of Physical Unclonable Functions","year":"2009","author":"r\u00fchrmair","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref19","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"suh","year":"2007","journal-title":"Proceedings of the 44th Annual Design Automation Conference"},{"key":"ref28","article-title":"Analog Circuits for Physical Cryptography","author":"chen","year":"2009","journal-title":"IEEE International Symposium on Integrated Circuits (ISIC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_7"},{"article-title":"Na-noelectronic Solutions for Hardware Security","year":"2012","author":"rajendran","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_25"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462128"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2011.942730"},{"key":"ref7","article-title":"Realization of RF Distance Bounding","author":"rasmussen","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_24"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/11964254_9","article-title":"So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks","author":"clulow","year":"2006","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks"},{"key":"ref1","article-title":"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars","author":"francillon","year":"2011","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28368-0_22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"}],"event":{"name":"2015 International Conference and Workshops on Networked Systems (NetSys)","start":{"date-parts":[[2015,3,9]]},"location":"Cottbus, Germany","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 International Conference and Workshops on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083793\/7089054\/07089068.pdf?arnumber=7089068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T17:06:22Z","timestamp":1651770382000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7089068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/netsys.2015.7089068","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}