{"id":"https://openalex.org/W2946002742","doi":"https://doi.org/10.1145/3317549.3319729","title":"Distance bounding under different assumptions","display_name":"Distance bounding under different assumptions","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946002742","doi":"https://doi.org/10.1145/3317549.3319729","mag":"2946002742"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3319729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3319729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048652347","display_name":"David G\u00e9rault","orcid":"https://orcid.org/0000-0001-8583-0668"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"David Gerault","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036379679","display_name":"Ioana Boureanu","orcid":"https://orcid.org/0000-0001-5864-777X"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ioana Boureanu","raw_affiliation_strings":["University of Surrey, UK"],"affiliations":[{"raw_affiliation_string":"University of Surrey, UK","institution_ids":["https://openalex.org/I28290843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048652347"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54683548,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"245","last_page":"248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.9137635231018066},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.7414848208427429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7230068445205688},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7050449848175049},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6391786932945251},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.5535740852355957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.478426992893219},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4092823565006256},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3578764796257019},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3275090754032135},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1726536750793457},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09784826636314392},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08356708288192749},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.060525715351104736}],"concepts":[{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.9137635231018066},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.7414848208427429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7230068445205688},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7050449848175049},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6391786932945251},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.5535740852355957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.478426992893219},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4092823565006256},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3578764796257019},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3275090754032135},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1726536750793457},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09784826636314392},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08356708288192749},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.060525715351104736},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3317549.3319729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3319729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.44SUR_INST:11139116350002346","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:epubs.surrey.ac.uk:852762","is_oa":false,"landing_page_url":"http://epubs.surrey.ac.uk/852762/1/2.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400680","display_name":"Surrey Research Insight Open Access (The University of Surrey)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28290843","host_organization_name":"University of Surrey","host_organization_lineage":["https://openalex.org/I28290843"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2711952031","display_name":null,"funder_award_id":"EP/R006938/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6953541449","display_name":null,"funder_award_id":"EP/N002717/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W87668852","https://openalex.org/W296953449","https://openalex.org/W950275316","https://openalex.org/W1494610650","https://openalex.org/W1599175145","https://openalex.org/W1982494235","https://openalex.org/W2029693536","https://openalex.org/W2036469960","https://openalex.org/W2102511449","https://openalex.org/W2104099113","https://openalex.org/W2109394932","https://openalex.org/W2167930752","https://openalex.org/W2288410626","https://openalex.org/W2397242782","https://openalex.org/W2542343207","https://openalex.org/W2561675875","https://openalex.org/W2598250020","https://openalex.org/W2613836390","https://openalex.org/W2787769028","https://openalex.org/W2788554714","https://openalex.org/W2794645714","https://openalex.org/W2794691483","https://openalex.org/W2806023047","https://openalex.org/W2874858706","https://openalex.org/W2951003449","https://openalex.org/W3013540181","https://openalex.org/W3127570909","https://openalex.org/W4251010021","https://openalex.org/W4251686622","https://openalex.org/W4316089808"],"related_works":["https://openalex.org/W2899793048","https://openalex.org/W2950202488","https://openalex.org/W1594411369","https://openalex.org/W4385887367","https://openalex.org/W2027534055","https://openalex.org/W2604424424","https://openalex.org/W2089533936","https://openalex.org/W2042358705","https://openalex.org/W3031524031","https://openalex.org/W1436254147"],"abstract_inverted_index":{"Distance-bounding":[0],"protocols":[1,33,44],"were":[2,37],"introduced":[3],"in":[4,12],"1993":[5],"as":[6],"a":[7,21,24],"countermeasure":[8],"to":[9],"relay":[10],"attacks,":[11],"which":[13],"an":[14],"adversary":[15],"fraudulently":[16],"forwards":[17],"the":[18,28,40,60],"communication":[19],"between":[20],"verifier":[22],"and":[23,45,58],"distant":[25],"prover.":[26],"In":[27,49],"more":[29],"than":[30],"40":[31],"different":[32],"that":[34],"followed,":[35],"assumptions":[36],"taken":[38],"on":[39],"structure":[41],"of":[42],"distance-bounding":[43],"their":[46],"threat":[47],"models.":[48],"this":[50],"paper,":[51],"we":[52],"survey":[53],"works":[54],"disrupting":[55],"these":[56],"assumptions,":[57],"discuss":[59],"remaining":[61],"challenges.":[62]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
