The following publications are possibly variants of this publication:
- RFID distance bounding protocol with mixed challenges to prevent relay attacksChong Hee Kim, Gildas Avoine. iacr, 2009:310, 2009. [doi]
- RFID Distance Bounding Protocols with Mixed ChallengesChong Hee Kim, Gildas Avoine. TWC, 10(5):1618-1626, 2011. [doi]
- A framework for analyzing RFID distance bounding protocolsGildas Avoine, Muhammed Ali Bingöl, Süleyman Kardas, Cédric Lauradoux, Benjamin Martin 0002. jcs, 19(2):289-317, 2011. [doi]
- The Swiss-Knife RFID Distance Bounding ProtocolChong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira. icisc 2009: 98-115 [doi]
- m-Ary Challenges for RFID Distance Bounding ProtocolYoung-Sik Kim, Sang-Hyo Kim. ieicet, 99-B(9):2028-2035, 2016. [doi]
- Optimal Security Limits of RFID Distance Bounding ProtocolsOrhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine. rfidsec 2010: 220-238 [doi]