{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:49:51Z","timestamp":1744202991076,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_16","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"228-237","source":"Crossref","is-referenced-by-count":23,"title":["Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)"],"prefix":"10.1007","author":[{"given":"Karsten","family":"Nohl","sequence":"first","affiliation":[]},{"given":"David","family":"Evans","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11957454_19","volume-title":"Privacy Enhancing Technologies","author":"L. Butty\u00e1n","year":"2006","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: Optimal key-trees for tree-based private authentication. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 332\u2013350. Springer, Heidelberg (2006)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.: Defining strong privacy for RFID (2006)","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Conference on Computer and Communications Security \u2013 ACM CCS (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Nohara, Y., Inoue, S., Baba, K., Yasuura, H.: Quantitative evaluation of unlinkable id matching schemes. In: Workshop on Privacy in the Electronic Society \u2013 WPES (2006)","DOI":"10.1145\/1102199.1102212"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Nohl, K., Evans, D.: Quantifying information leakage in tree-based hash protocols. Technical Report CS-2006-20, University of Virginia, Computer Science Department (October 2006)","DOI":"10.1007\/11935308_16"},{"key":"16_CR8","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to \u201cprivacy-friendly\u201d tags. In: RFID Privacy Workshop (2003)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory (2001)","DOI":"10.1109\/18.959263"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communication (1948)","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"16_CR12","unstructured":"Tsudik, G.: YA-TRAP: Yet another trivial RFID authentication protocol. In: PerCom (2006)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: International Conference on Security in Pervasive Computing \u2013 SPC (2003)","DOI":"10.1007\/978-3-540-39881-3_18"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:08:34Z","timestamp":1566763714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11935308_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}