{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:17:44Z","timestamp":1725470264622},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540380801"},{"type":"electronic","value":"9783540380818"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11832072_21","type":"book-chapter","created":{"date-parts":[[2006,8,30]],"date-time":"2006-08-30T00:43:49Z","timestamp":1156898629000},"page":"303-320","source":"Crossref","is-referenced-by-count":24,"title":["Shoehorning Security into the EPC Tag Standard"],"prefix":"10.1007","author":[{"given":"Daniel V.","family":"Bailey","sequence":"first","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"ECRYPT (European network for excellence in cryptology) stream cipher project Web page (2006), Referenced 2006 at: http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"21_CR2","unstructured":"Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 wireless network has no clothes (2006), Referenced 2006 at: http:\/\/citeseer.ist.psu.edu\/arbaugh01your.html"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"21_CR4","unstructured":"Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: McDaniel, P. (ed.) 14th USENIX Security Symposium, USENIX, pp. 1\u201316 (2005), Dedicated Web site at: www.rfidanalysis.org"},{"key":"21_CR5","unstructured":"Collins, J.: Ge uses RFID to secure cargo. RFID Journal. (January 12, 2005), Referenced 2006 at: http:\/\/www.rfidjournal.com\/article\/articleview\/1317\/1\/1\/"},{"key":"21_CR6","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0 (2006) Referenced 2006 at: http:\/\/www.ietf.org\/rfc\/rfc2246.txt"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-30496-8_5","volume-title":"Security in Ad-hoc and Sensor Networks","author":"K.P. Fishkin","year":"2005","unstructured":"Fishkin, K.P., Roy, S., Jiang, B.: Some methods for privacy in RFID communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 42\u201353. Springer, Heidelberg (2005)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"P. Golle","year":"2004","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 163\u2013178. Springer, Heidelberg (2004)"},{"key":"21_CR10","unstructured":"IEEE. IEEE 802.11-1999, IEEE standard for information technology\u2013telecommunications and information exchange between system\u2013local and metropolitan area networks specific requirements\u2013part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1999)"},{"key":"21_CR11","unstructured":"IEEE. IEEE 802.11i-2004, amendment to IEEE std 802.11, 1999 edition (reaff 2003). IEEE standard for information technology\u2013telecommunications and information exchange between system\u2013local and metropolitan area networks specific requirements\u2013part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications\u2013amendment 6: Medium access control (MAC) security enhancements. Referenced 2006 at: www.standards.ieee.org\/get\/ieee802\/download\/802.11i-2004.pdf"},{"key":"21_CR12","unstructured":"EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. Referenced 2006 at: http:\/\/www.epcglobalinc.com\/standards_technology\/EPCglobalClass1Generation-2UHFRFIDProtocolV109.pdf"},{"key":"21_CR13","unstructured":"EPCglobal Inc. Class 1 generation 2 UHF RFID conformance requirements version 1.0.2. Referenced 2006 at: http:\/\/www.epcglobalinc.com\/standards_technology\/EPCglobalClass-1Generation-2UHFRFIDConformanceV102.pdf"},{"key":"21_CR14","unstructured":"ISO. Identification cards \u2013 contactless integrated circuit(s) cards \u2013 proximity cards \u2013 part 4: Transmission protocol. Referenced 2006 at: http:\/\/www.iso.org\/iso\/en\/CatalogueDetailPage.CatalogueDetail?CSNUMBER=31425"},{"key":"21_CR15","unstructured":"ISO. Identification cards \u2013 integrated circuit cards \u2013 part 4: Organization, security and commands for interchange. Referenced 2006 at: http:\/\/www.iso.org\/iso\/en\/CatalogueDetailPage.CatalogueDetail?CSNUMBER=36134"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist cryptography for low-cost RFID tags (extended abstract). In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 149\u2013164. Springer, Heidelberg (2005)"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/PERCOMW.2004.1276920","volume-title":"Workshop on Pervasive Computing and Communications Security \u2013 PerSec 2004","author":"A. Juels","year":"2004","unstructured":"Juels, A.: \u2018Yoking-proofs\u2019 for RFID tags. In: Sandhu, R., Thomas, R. (eds.) Workshop on Pervasive Computing and Communications Security \u2013 PerSec 2004, pp. 138\u2013143. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1080793.1080805","volume-title":"ACM Workshop on Wireless Security (WiSe)","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Strengthing EPC tags against cloning. In: ACM Workshop on Wireless Security (WiSe), pp. 67\u201376. ACM Press, New York (2005)"},{"key":"21_CR19","unstructured":"Juels, A.: RFID security and privacy: A research survey. J-SAC (to appear, 2006), Online version referenced 2005 at: http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2937"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"8th ACM Conference on Computer and Communications Security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Atluri, V. (ed.) 8th ACM Conference on Computer and Communications Security, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11767831_14","volume-title":"Privacy Enhancing Technologies","author":"A. Juels","year":"2006","unstructured":"Juels, A., Syverson, P.F., Bailey, D.: High-power proxies for enhancing RFID privacy and utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 210\u2013226. Springer, Heidelberg (2006)"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Moskowitz, P.: Disabling RFID tags with visible confirmation: Clipped tags are silenced (short paper). In: De Capitani di Vimercati, S., Dingledine, R. (eds.) Workshop on Privacy in the Electronic Society (WPES) (2005)","DOI":"10.1145\/1102199.1102205"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Molnar, D., Soppera, A., Wagner, D.: Privacy for RFID through trusted computing (short paper). In: De Capitani di Vimercati, S., Dingledine, R. (eds.) Workshop on Privacy in the Electronic Society (WPES) (2005)","DOI":"10.1145\/1102199.1102206"},{"key":"21_CR25","first-page":"210","volume-title":"ACM Conference on Communications and Computer Security","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., McDaniel, P. (eds.) ACM Conference on Communications and Computer Security, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"21_CR26","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing \u2013 Ubicomp, Workshop Privacy: Current Status and Future Directions (2004)"},{"key":"21_CR27","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"21_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information Security and Privacy","author":"M.R. Rieback","year":"2005","unstructured":"Rieback, M.R., Crispo, B., Tanenbaum, A.S.: RFID guardian: A battery-powered mobile device for RFID privacy management. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 184\u2013194. Springer, Heidelberg (2005)"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1145\/1066677.1067041","volume-title":"ACM Symposium on Applied Computing","author":"T. Staake","year":"2005","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network \u2013 the potential of RFID in anti-counterfeiting. In: ACM Symposium on Applied Computing, pp. 1607\u20131612. ACM Press, New York (2005)"},{"key":"21_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (to appear, 2006)"},{"key":"21_CR31","unstructured":"Vajda, I., Butty\u00e1n, L.: Lightweight authentication protocols for low-cost RFID tags. In: Workshop on Security in Ubiquitous Computing \u2013 Ubicomp 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Security and Cryptography for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11832072_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T19:50:47Z","timestamp":1555789847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11832072_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540380801","9783540380818"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11832072_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}