ABADI, M., BLANCHET, B., and FOURNET, C. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. JACM 65, 1 (2017).
ABADI, M., and FOURNET, C. Mobile values, new names, and secure communication. In POPL'01 (2001).
AVOINE, G., BINGOL, M., BOUREANU, I., CAPKUN, S., HANCKE, G., KARDAS, S., KIM, C., LAURADOUX, C., MARTIN, B., MUNILLA, J., AND ET AL. Security of distance-bounding: A survey. CSUR 4 (2017).
AVOINE, G., BINGÖL, M. A., KARDAş, S., LAURADOUX, C., and MARTIN, B. A framework for analyzing RFID distance bounding protocols. JCS 19, 2 (2011).
AVOINE, G., and TCHAMKERTEN, A. An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement. In ISC'09 (2009).
BBC. Car theft 'relay' devices seized in Birmingham. http://www.bbc.com/news/uk-england-birmingham-42370086.
BLANCHET, B., ABADI, M., and FOURNET, C. Automated verification of selected equivalences for security protocols. JLAP (2008).
BLANCHET, B., SMYTH, B., CHEVAL, V., and SYLVESTRE, M. ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial, 2018.
BOUREANU, I., MITROKOTSA, A., and VAUDENAY, S. Practical and provably secure distance-bounding. JCS 23, 2 (2015).
BOUREANU, I., and VAUDENAY, S. Optimal proximity proofs. vol. 8957 of LNCS.
BRANDS, S., and CHAUM, D. Distance-bounding protocols. In EUROCRYPT'93 (1994).
CHOTHIA, T., and GARCIA, F. D., DE RUITER, J., VAN DEN BREEKEL, J., and THOMPSON, M. Relay cost bounding for contactless EMV payments. In FC'15, vol. 8975 of LNCS. 2015.
CREMERS, C. J. F., and RASMUSSEN, K. B., SCHMIDT, B., and CAPKUN, S. Distance hijacking attacks on distance bounding protocols. In S&P'12 (2012), IEEE.
DE, J., HUBMER, P., MURRAY, B., NEUMANN, H., STERN, S., and THUERINGER, P. Decoupling of measuring the response time of a transponder and its authentication, 2011. EP Patent App. EP20,080,874,469.
DEBANT, A., DELAUNE, S., and WIEDLING, C. Proving physical proximity using symbolic models. Research report, Univ Rennes, CNRS, IRISA, France, 2018.
DESMEDT, Y. Major security problems with the 'unforge-able' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SECURICOM (1988).
DESMEDT, Y., GOUTIER, C., and BENGIO, S. Special uses and abuses of the Fiat-Shamir passport protocol. In CRYPTO (1987), vol. 293 of LNCS.
DÜRHOLZ, U., FISCHLIN, M., KASPER, M., and ONETE, C. A formal approach to distance-bounding RFID protocols. In ISC'11 (2011).
EMVCO. EMV - Integrated Circuit Card Specifications for Payment Systems, version 4.3, 2011.
EMVCO. EMV Contactless Specifications for Payment Systems, version 2.6, 2016.
FRANCILLON, A., DANEV, B., and CAPKUN, S. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS'11 (2011).
GARCIA, F. D., OSWALD, D., KASPER, T., AND PAVLIDÈS, P. Lock it and still lose it -on the (in)security of automotive remote keyless entry systems. In USENIX Security'16 (2016), USENIX.
HABRAKEN, R., DOLRON, P., POLL, E., and DE RUITER, J. An RFID skimming gate using higher harmonics. In RFID-Sec'15, vol. 9440 of LNCS. 2015.
HANCKE, G., and KUHN, M. An RFID distance bounding protocol. In SecureComm'05 (2005), IEEE, pp. 67-73.
JANSSENS, P. Proximity check for communication devices, 2017. US Patent 9,805,228.
KANOVICH, M., and KIRIGIN, T. B., NIGAM, V., SCEDROV, A., and TALCOTT, C. Towards timed models for cyber-physical security protocols. In FCS-FCC'14 (2014).
MALLADI, S., BRUHADESHWAR, B., and KOTHAPALLI, K. Automatic analysis of distance bounding protocols. CoRR abs/1003.5383 (2010).
MAUW, S., SMITH, Z., TORO-POZO, J., and TRUJILLO-RASUA, R. Distance-bounding protocols: Verification without time and location. In S&P'14 (2018).
MAUW, S., TORO-POZO, J., and TRUJILLO-RASUA, R. A class of precomputation-based distance-bounding protocols. In EuroS&P'16 (2016).
MEADOWS, C. A., POOVENDRAN, R., PAVLOVIC, D., CHANG, L., and SYVERSON, P. F. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (2007).
NIGAM, V., TALCOTT, C., and URQUIZA, A. A. Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders. In ESORICS'16 (2016).
RASMUSSEN, K. B., AND ČAPKUN, S. Realization of RF distance bounding. In USENIX Security'10 (2010).
RYAN, M. D., and SMYTH, B. Applied pi calculus. In Formal Models and Techniques for Analyzing Security Protocols. IOS, 2011, ch. 6.
SCHALLER, P., SCHMIDT, B., BASIN, D., and CAPKUN, S. Modeling and verifying physical properties of security protocols for wireless networks. In CSF'09 (2009).
TRUJILLO-RASUA, R., MARTIN, B., and AVOINE, G. The poulidor distance-bounding protocol. In RFIDSec'10 (2010).
ČAPKUN, S., BUTTYÁN, L., AND HUBAUX, J.-P. Sector: Secure tracking of node encounters in multi-hop wireless networks. In SASN'03 (2003).