{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T15:26:16Z","timestamp":1743348376921},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540347453"},{"type":"electronic","value":"9783540347460"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767831_14","type":"book-chapter","created":{"date-parts":[[2006,6,21]],"date-time":"2006-06-21T08:03:07Z","timestamp":1150876987000},"page":"210-226","source":"Crossref","is-referenced-by-count":44,"title":["High-Power Proxies for Enhancing RFID Privacy and Utility"],"prefix":"10.1007","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Bailey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Danezis, G.: Personal communications (2003)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-30496-8_5","volume-title":"Security in Ad-hoc and Sensor Networks","author":"K.P. Fishkin","year":"2005","unstructured":"Fishkin, K.P., Roy, S., Jiang, B.: Some methods for privacy in RFID communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 42\u201353. Springer, Heidelberg (2005)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/11526858_17","volume-title":"Ubiquitous Computing Systems","author":"C. Floerkemeier","year":"2005","unstructured":"Floerkemeier, C., Schneider, R., Langheinrich, M.: Scanning with a purpose \u2013 supporting the fair information principles in RFID protocols. In: Murakami, H., Nakashima, H., Tokuda, H., Yasumura, M. (eds.) UCS 2004. LNCS, vol.\u00a03598, pp. 214\u2013231. Springer, Heidelberg (2005), Available at: http:\/\/www.vs.inf.ethz.ch\/publ\/?author=floerkem"},{"key":"14_CR5","unstructured":"Garfinkel, S.: An RFID Bill of Rights. Technology Review, 35 (October 2002)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"P. Golle","year":"2004","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 163\u2013178. Springer, Heidelberg (2004)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Juels, A.: Strengthening EPC tags against cloning (in submission, 2004), Referenced at: rfid-security.com","DOI":"10.1145\/1080793.1080805"},{"key":"14_CR8","first-page":"138","volume-title":"PerCom Workshops 2004","author":"A. Juels","year":"2004","unstructured":"Juels, A.: \u2018Yoking-proofs\u2019 for RFID tags. In: PerCom Workshops 2004, pp. 138\u2013143. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1029179.1029181","volume-title":"Wireless Privacy in the Electronic Society (WPES 2004)","author":"A. Juels","year":"2004","unstructured":"Juels, A., Brainard, J.: Soft blocking: Flexible blocker tags on the cheap. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Wireless Privacy in the Electronic Society (WPES 2004), pp. 1\u20138. ACM Press, New York (2004)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"14_CR11","first-page":"103","volume-title":"8th ACM Conference on Computer and Communications Security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Atluri, V. (ed.) 8th ACM Conference on Computer and Communications Security, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"14_CR12","first-page":"149","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2004","unstructured":"Juels, A.: Minimalist Cryptography for RFID Tags. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks, pp. 149\u2013164. Springer, Heidelberg (2004)"},{"key":"14_CR13","unstructured":"AutoID Labs. 860 MHz-960 Mhz class 1 radio frequency identification tag radio frequency and logical communication interface specification recommended standard, version 1.0.0. Technical Report MIT-AUTOID-WH-007, Auto-ID Labs (2002), Referenced in 2005 at: http:\/\/www.autoidlabs.com"},{"key":"14_CR14","unstructured":"McCullagh, D.: RFID tags: Big Brother in small packages. CNet, (January 13, 2003), Available at: http:\/\/news.com.com\/2010-1069-980325.html"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., McDaniel, P. (eds.) ACM CCS, pp. 210\u2013219 (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"14_CR16","unstructured":"Nokia unveils RFID phone reader. RFID Journal (March 17, 2004), Available at: http:\/\/www.rfidjournal.com\/article\/view\/834"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0028156","volume-title":"Security Protocols","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Protocols using anonymous connections: Mobile applications. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 13\u201323. Springer, Heidelberg (1998), Available at: http:\/\/chacs.nrl.navy.mil\/publications\/CHACS\/1997\/"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"14_CR19","unstructured":"Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-2006, MIT Auto ID Center (2001), Available from: http:\/\/www.epcglobalinc.org"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013194. Springer, Heidelberg (2000)"},{"key":"14_CR21","unstructured":"Stanley, J.: Chip away at privacy: Library tracking system spawns Big Brother ire. San Francisco Chronicle (July 2, 2004)"},{"key":"14_CR22","unstructured":"Stapleton-Gray, R.: Would Macy\u2019s scan Gimbels? competitive intelligence and RFID. Technical report, Stapleton-Gray & Associates, Inc. (2003), Available at: http:\/\/www.stapleton-gray.com\/papers\/ci-20031027.PDF"},{"issue":"6","key":"14_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/40.977757","volume":"21","author":"K. Takaragi","year":"2001","unstructured":"Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro\u00a021(6), 43\u201349 (2001)","journal-title":"IEEE Micro"},{"key":"14_CR24","unstructured":"Tanenbaum, A., Gaydadjiev, G., Crispo, B., Rieback, M., Stafylarakis, D., Zhang, C.: The RFID Guardian project, URL: http:\/\/www.cs.vu.nl\/~melanie\/rfid_guardian\/people.html"},{"key":"14_CR25","unstructured":"Tuchinda, R.: Security and privacy in the intelligent room. Master\u2019s thesis, MIT (May 15, 2002)"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767831_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T09:30:37Z","timestamp":1555666237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767831_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540347453","9783540347460"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11767831_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}