{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:20:25Z","timestamp":1736054425340,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282273"},{"type":"electronic","value":"9783540319078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11538356_86","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:24:05Z","timestamp":1127831045000},"page":"831-840","source":"Crossref","is-referenced-by-count":1,"title":["Safe RFID System Modeling Using Shared Key Pool in Ubiquitous Environments"],"prefix":"10.1007","author":[{"given":"Jinmook","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hwangbin","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A Key-management Scheme for Distributed Sensor Networks. In: ACM CCS 2002, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"86_CR2","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes For Sensor Network. In: IEEE Symposium on Security and Privcy (2003)"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Yunghsiang, S.H., Pramod, K.V.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. In: Proceeding of the 10th ACM conference of Computer and Communication Security, Washington D.C., USA, October 27-30 (2003)","DOI":"10.1145\/948109.948118"},{"key":"86_CR4","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: 11th IEEE International Conference on Network Protocols (ICNP 2003), Atlanta, Georgia, November 4-7 (2003)"},{"key":"86_CR5","unstructured":"Kalidindi, R., Parachuri, V., Kannan, R., Durresi, A., Iyengar, S.: Sub-Quorum Based Key Vector Assignment: A Key Pre-Distribution Scheme For Wireless Sensor Networs. In: Intnl. Conf. on Wireless Networking (ICWN 2004), Las Vagas (July 2004)"},{"key":"86_CR6","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington D.C. (October 2003)","DOI":"10.1145\/948109.948119"},{"key":"86_CR7","unstructured":"Balfanz, D., Dean, D., Franklin, M., Miner, S., Staddon, J.: Self-healing Key Distribution with Revocation. In: Proceeding of the IEEE Symposium on Research in Security and Privacy, May 2002, pp. 241\u2013257 (2002)"},{"key":"86_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-45682-1_17","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D.S. Wong","year":"2001","unstructured":"Wong, D.S., Chan, A.H.: Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 272. Springer, Heidelberg (2001)"},{"key":"86_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S. Weis","year":"2004","unstructured":"Weis, S., et al.: Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"86_CR10","unstructured":"Rivest, R.L.: Approaches to RFID Privacy. In: RSA Japen Conference (2003)"},{"key":"86_CR11","doi-asserted-by":"crossref","unstructured":"Sarma, S., Weis, S., Engls, D.: RFID Systems, Security & Privacy Implications. AutoID Center. white Paper (2002)","DOI":"10.1007\/3-540-36400-5_33"},{"key":"86_CR12","volume-title":"Security and Privacy in Radio-Frequency Identification Devices","author":"A.W. Stephen","year":"2003","unstructured":"Stephen, A.W.: Security and Privacy in Radio-Frequency Identification Devices. MIT, Cambridge (2003)"},{"key":"86_CR13","unstructured":"Juels, A., Rivest, L.R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. RSA Laboratory. MIT"},{"key":"86_CR14","unstructured":"Juels, A., Brainard, J.: Soft Blocking: Flexible Blocker Tags on the Cheap. RSA Laboratory"},{"key":"86_CR15","unstructured":"Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. RSA Laboratory"},{"key":"86_CR16","doi-asserted-by":"crossref","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-encryption for Mixnets. RSA Laboratory (2004)","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"86_CR17","unstructured":"Sakata, S.: Security Technology for Mobile and Ubiquitous Communication. IEICE Magazine\u00a087(5) (May 2004)"},{"key":"86_CR18","unstructured":"Otsuka, T., Onozawa, A.: User Privacy in Ubiquitous Network: Anonymous Communication Technique for Ad-hoc Network. Technical Report of IEICE ISEC (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11538356_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:51:12Z","timestamp":1736005872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11538356_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282273","9783540319078"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11538356_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}