{"id":"https://openalex.org/W2764016253","doi":"https://doi.org/10.1109/tetc.2017.2761702","title":"Energy-Efficient Distance-Bounding with Residual Charge Computation","display_name":"Energy-Efficient Distance-Bounding with Residual Charge Computation","publication_year":2017,"publication_date":"2017-10-13","ids":{"openalex":"https://openalex.org/W2764016253","doi":"https://doi.org/10.1109/tetc.2017.2761702","mag":"2764016253"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2017.2761702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2017.2761702","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8299&context=sis_research","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011964412","display_name":"Yunhui Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yunhui Zhuang","raw_affiliation_strings":["Department of Information Systems, College of Business, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Business, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cybersecurity/College of Information Science and Technology, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity/College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019818778","display_name":"Gerhard P. Hancke","orcid":"https://orcid.org/0000-0002-2388-3542"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Gerhard P. Hancke","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["CryptoBLK Limited, Hong Kong"],"affiliations":[{"raw_affiliation_string":"CryptoBLK Limited, Hong Kong","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091475823","display_name":"Guomin Yang","orcid":"https://orcid.org/0000-0002-4949-7738"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guomin Yang","raw_affiliation_strings":["University of Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011964412"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":1.3155,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83813728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"8","issue":"2","first_page":"365","last_page":"376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8549731969833374},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.6529585719108582},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.592042088508606},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5306217670440674},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5208373665809631},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4513191878795624},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44609126448631287},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4212411642074585},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3875873386859894},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3240889608860016},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2916373014450073},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08659049868583679}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8549731969833374},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.6529585719108582},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.592042088508606},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5306217670440674},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5208373665809631},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4513191878795624},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44609126448631287},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4212411642074585},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3875873386859894},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3240889608860016},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2916373014450073},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08659049868583679},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tetc.2017.2761702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2017.2761702","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8299","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8299&context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://doi.org/10.1109/TETC.2017.2761702","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8299","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8299&context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://doi.org/10.1109/TETC.2017.2761702","raw_type":"Journal Article"},"sustainable_development_goals":[{"score":0.8999999761581421,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G4401275181","display_name":null,"funder_award_id":"2017M612842","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6989210334","display_name":null,"funder_award_id":"61702222","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7432492318","display_name":null,"funder_award_id":"7004473","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"}],"funders":[{"id":"https://openalex.org/F4320309893","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322170","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W719168","https://openalex.org/W46722664","https://openalex.org/W87668852","https://openalex.org/W1543653153","https://openalex.org/W1632109869","https://openalex.org/W1651148894","https://openalex.org/W1727616536","https://openalex.org/W1734735686","https://openalex.org/W1754999230","https://openalex.org/W1878267993","https://openalex.org/W1989332091","https://openalex.org/W1998828437","https://openalex.org/W2021447283","https://openalex.org/W2024565592","https://openalex.org/W2029693536","https://openalex.org/W2036469960","https://openalex.org/W2042358705","https://openalex.org/W2042458836","https://openalex.org/W2063068653","https://openalex.org/W2065427552","https://openalex.org/W2127785555","https://openalex.org/W2163775113","https://openalex.org/W2165376769","https://openalex.org/W2167990963","https://openalex.org/W2175341774","https://openalex.org/W2269598925","https://openalex.org/W2559052892","https://openalex.org/W2567642374","https://openalex.org/W2613836390","https://openalex.org/W2738829106","https://openalex.org/W2951869340","https://openalex.org/W4245640329","https://openalex.org/W6637778182","https://openalex.org/W6685592890","https://openalex.org/W6764742183","https://openalex.org/W7074611982"],"related_works":["https://openalex.org/W2042358705","https://openalex.org/W3031524031","https://openalex.org/W1436254147","https://openalex.org/W2176772889","https://openalex.org/W2102905434","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W2282990539"],"abstract_inverted_index":{"Real-time":[0],"location":[1],"systems":[2,18,66],"are":[3],"often":[4],"required":[5],"in":[6,101,145],"industrial":[7],"applications.":[8],"In":[9,84],"addition":[10],"to":[11,21,31,40,60,114,122,137,157,171,180],"securely":[12],"determining":[13],"an":[14,34],"item's":[15],"location,":[16],"these":[17],"also":[19,167],"need":[20],"accommodate":[22],"energy-limited":[23],"tracking":[24],"tokens.":[25],"Distance-bounding":[26],"protocols":[27,56],"enable":[28],"a":[29,41,89,102,111],"Verifier":[30],"cryptographically":[32],"determine":[33,123,138],"upper-bound":[35],"on":[36,64],"the":[37,45,73,81,116,126,133,139,149,155,163,177,185],"physical":[38],"distance":[39],"Prover":[42],"by":[43],"measuring":[44],"round-trip":[46],"time":[47],"of":[48,55,75,132],"specially":[49],"designed":[50],"challenge-response":[51],"messages.":[52],"This":[53,143],"type":[54],"serve":[57],"as":[58],"countermeasure":[59],"three":[61,98],"common":[62,99],"attacks":[63,100],"location-based":[65],"and":[67,119,166],"have":[68],"been":[69],"extensively":[70],"studied":[71],"with":[72,105],"goal":[74],"achieving":[76],"optimal":[77],"security":[78,107],"bounds":[79],"for":[80,154,184],"respective":[82],"attacks.":[83],"this":[85],"paper,":[86],"we":[87],"propose":[88],"new":[90,112],"energy-efficient":[91],"distance-bounding":[92,103],"protocol":[93,127,147,164,187],"that":[94],"protects":[95],"against":[96],"all":[97],"scenario":[104],"improved":[106],"bounds.":[108],"We":[109],"provide":[110],"approach":[113],"combining":[115],"response":[117,141,182],"registers":[118,183],"Prover's":[120,140],"key":[121],"responses.":[124],"Furthermore,":[125],"design":[128],"allows":[129,168],"offline":[130],"pre-computation":[131],"function":[134,161],"f":[135],"used":[136],"registers.":[142],"results":[144],"faster":[146],"execution,":[148,165],"reader":[150],"does":[151],"not":[152],"wait":[153],"tag":[156],"compute":[158,181],"any":[159],"cryptographic":[160],"during":[162],"passive":[169],"tokens":[170],"effectively":[172],"use":[173],"residual":[174],"energy":[175],"after":[176],"preceding":[178],"transaction":[179],"next":[186],"run.":[188]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
