{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:40:58Z","timestamp":1773380458256,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540494966","type":"print"},{"value":"9783540494973","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_1","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T11:26:42Z","timestamp":1163590002000},"page":"1-20","source":"Crossref","is-referenced-by-count":94,"title":["Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer"],"prefix":"10.1007","author":[{"given":"Chae Hoon","family":"Lim","sequence":"first","affiliation":[]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Anderson, R.: Two remarks on public key cryptology. Technical Reports, UCAM-CL-TR-549. Univ. of Cambridge (2002), http:\/\/www.cl.cam.ac.uk\/TechReports\/"},{"key":"1_CR2","unstructured":"Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005\/049 (2005)"},{"key":"1_CR3","unstructured":"Avoine, G.: Security and privacy in RFID systems (A complete list of related papers) (last access, May 2006), http:\/\/lasecwww.epfl.ch\/~gavoine\/rfid\/"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/11507840_14","volume-title":"Financial Cryptography and Data Security","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 125\u2013140. Springer, Heidelberg (2005)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/PERCOMW.2005.12","volume-title":"The 2nd IEEE International Workshop on Pervasive Computing and Communication Security - PerSec 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: The 2nd IEEE International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pp. 110\u2013114. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"1_CR7","unstructured":"Boycott Benetton Home Page (2003), http:\/\/www.boycottbenetton.com\/"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: IEEE SecureComm., pp. 59\u201366 (2005)","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"1_CR9","unstructured":"EPCglobal Web site (2005), http:\/\/www.EPCglobalinc.org"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"1_CR11","volume-title":"RFID Handbook","author":"K. Finkenzeller","year":"1999","unstructured":"Finkenzeller, K.: RFID Handbook. John Wiley & Sons, Chichester (1999)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/PERCOMW.2004.1276922","volume-title":"Workshop on Pervasive Computing and Communications Security - PerSec 2004","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Workshop on Pervasive Computing and Communications Security - PerSec 2004, pp. 149\u2013153. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 149\u2013164. Springer, Heidelberg (2005)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications (2006)","DOI":"10.1109\/JSAC.2005.861395"},{"issue":"3","key":"1_CR15","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"A. Juels","year":"2005","unstructured":"Juels, A., Garfinkel, S., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"1_CR16","volume-title":"IEEE SecureComm 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: IEEE SecureComm 2005. IEEE, Los Alamitos (2005), referenced 2005 at: http:\/\/www.cs.berkeley.edu\/dmolnar\/papers\/papers.html"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"8th ACM Conference on Computer and Communications Security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: 8th ACM Conference on Computer and Communications Security, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11767831_14","volume-title":"Privacy Enhancing Technologies","author":"A. Juels","year":"2006","unstructured":"Juels, A., Syverson, P., Bailey, D.: High-power proxies for enhancing RFID privacy and utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 210\u2013226. Springer, Heidelberg (2006)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11604938_19","volume-title":"Information Security Applications","author":"C.H. Lim","year":"2006","unstructured":"Lim, C.H., Korkishko, T.: mCrypton-A lightweight block cipher for security of low-cost RFID tags and sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 243\u2013258. Springer, Heidelberg (2006)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/11424758_65","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S. Lee","year":"2005","unstructured":"Lee, S., Hwang, Y., Lee, D., Lim, J.: Efficient authentication for low-cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03480, pp. 619\u2013627. Springer, Heidelberg (2005)"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-24676-3_19","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"T. Malkin","year":"2004","unstructured":"Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving Signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 306\u2013322. Springer, Heidelberg (2004)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 276\u2013290. Springer, Heidelberg (2006)"},{"key":"1_CR24","first-page":"210","volume-title":"ACM Conference on Communications and Computer Security","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Communications and Computer Security, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"1_CR25","unstructured":"Ohkubo, M., Suzuko, K., Kinoshita, S.: Cryptographic approach to \u201cprivacy-friendly\u201d tags. In: RFID Privacy Workshop (2003)"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information Security and Privacy","author":"M. Rieback","year":"2005","unstructured":"Rieback, M., Crispo, B., Tanenbaum, A.: RFID guardian: A battery-powered mobile device for RFID privacy management. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 184\u2013194. Springer, Heidelberg (2005)"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Sarma","year":"2003","unstructured":"Sarma, S., Weis, S., Engels, D.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Shirey, R.: Internet Security Glossary. IETF RFC 2828 (May 2000), at: http:\/\/www.ietf.org\/rfc\/rfc2828.txt","DOI":"10.17487\/rfc2828"},{"key":"1_CR29","unstructured":"Stop RFID, http:\/\/www.stoprfid.org"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S. Weis","year":"2004","unstructured":"Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 454\u2013469. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:14:23Z","timestamp":1736637263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11935308_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}