ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0906.4618
  4. Cited By
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud
  Attacks
v1v2 (latest)

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

25 June 2009
Pedro Peris-López
Julio César Hernández Castro
Christos Dimitrakakis
Aikaterini Mitrokotsa
Juan Tapiador
ArXiv (abs)PDFHTML

Papers citing "Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks"

2 / 2 papers shown
Users Authentication and Privacy control of RFID Card
Users Authentication and Privacy control of RFID Card
A. Ikuesan
Norafida Ithnin
129
12
0
05 Oct 2012
Expected loss analysis of thresholded authentication protocols in noisy
  conditions
Expected loss analysis of thresholded authentication protocols in noisy conditions
Christos Dimitrakakis
Aikaterini Mitrokotsa
S. Vaudenay
175
6
0
01 Sep 2010
1
Page 1 of 1