{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T10:02:36Z","timestamp":1773828156903,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687900","type":"print"},{"value":"9783540687931","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_1","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"1-19","source":"Crossref","is-referenced-by-count":45,"title":["Privacy for Public Transportation"],"prefix":"10.1007","author":[{"given":"Thomas S.","family":"Heydt-Benjamin","sequence":"first","affiliation":[]},{"given":"Hee-Jin","family":"Chae","sequence":"additional","affiliation":[]},{"given":"Benessa","family":"Defend","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm","author":"A. Juels","year":"2005","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports. In: Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm, Athens, Greece, IEEE, Los Alamitos (2005)"},{"key":"1_CR2","first-page":"210","volume-title":"Conference on Computer and Communications Security \u2013 ACM CCS","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security \u2013 ACM CCS, Washington DC, USA, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/11507840_14","volume-title":"Financial Cryptography and Data Security","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 125\u2013140. Springer, Heidelberg (2005)"},{"key":"1_CR4","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm, Athens, Greece, IEEE, Los Alamitos (2005)"},{"key":"1_CR5","first-page":"2","volume":"6","author":"S. Sarma","year":"2003","unstructured":"Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes, RSA Laboratories\u00a06, 2\u20139 (2003)","journal-title":"Cryptobytes, RSA Laboratories"},{"key":"1_CR6","unstructured":"Vajda, I., Butty\u00e1n, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: Second Workshop on Security in Ubiquitous Computing \u2013 Ubicomp 2003, Seattle, WA, USA (2003)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","first-page":"386","volume-title":"Smart Card. Research and Applications","author":"H. Handschuh","year":"2000","unstructured":"Handschuh, H., Paillier, P.: Smart Card Crypto-Coprocessors for Public Key Cryptography. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 386\u2013394. Springer, Heidelberg (2000)"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.977755","volume":"21","author":"E. Trichina","year":"2001","unstructured":"Trichina, E., Bucci, M., Seta, D.D., Luzzi, R.: Supplemental Cryptographic Hardware for Smart Cards. IEEE Micro\u00a021, 26\u201335 (2001)","journal-title":"IEEE Micro"},{"key":"1_CR9","first-page":"311","volume-title":"SEC 2002: Proceedings of the IFIP TC11 17th International Conference on Information Security","author":"E. Mohammed","year":"2002","unstructured":"Mohammed, E., Emarah, A., El-Shennawy, K.: Elliptic Curve Cryptosystems on Smart Cards. In: SEC 2002: Proceedings of the IFIP TC11 17th International Conference on Information Security, Deventer, The Netherlands, pp. 311\u2013322. Kluwer, B.V, Dordrecht (2002)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/319709.319715","volume-title":"CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security","author":"G. Poupard","year":"1999","unstructured":"Poupard, G., Stern, J.: On the Fly Signatures Based on Factoring. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 37\u201345. ACM Press, New York (1999)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 149\u2013164. Springer, Heidelberg (2005)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: EUROCRYPT, Innsbruck(Typrol), Austria, IACR (2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: CRYPTO, Santa Barbara, CA, USA (2004)","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: EUROCRYPT, Aarhus, Denmark, IACR, pp. 302\u2013321 (2005)","DOI":"10.1007\/11426639_18"},{"key":"1_CR15","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS) (2005)"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1145\/1102120.1102161","volume-title":"Proceedings of the 12th ACM conference on Computer and communications security (CCS 2005)","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Hohenberger, S.: Proxy Re-Signatures: New Definitions, Algorithms, and Applications. In: Proceedings of the 12th ACM conference on Computer and communications security (CCS 2005), Alexandria, VA, USA, pp. 310\u2013319. ACM Press, New York (2005)"},{"key":"1_CR17","unstructured":"Federal Transit Administration: Federal Transit Administration National Transit Database. WWW (2006), http:\/\/www.ntdprogram.com"},{"key":"1_CR18","unstructured":"The Smart Card Alliance: Hong Kong Octopus Card. WWW (2006), http:\/\/www.smarcardalliance.org\/pdf\/about_alliance\/user_profiles\/Hong_Kong_Octopus_Card.pdf"},{"key":"1_CR19","unstructured":"Winters, N.: Personal Privacy and Popular Ubiquitous Technology. In: Ubiconf, London, United Kingdom (2004)"},{"key":"1_CR20","unstructured":"Roschke, G.: Notes from an Information Law Student. In: WWW (2006) (Last viewed February 24, 2006), http:\/\/luminousvoid.net\/archives\/16\/wmata-responds"},{"key":"1_CR21","unstructured":"Maxey, C., Benjamin, P.: Seamless Fare Collection: Using Smart Cards for Multiple-Mode Transit Trips. In: WWW (2006), http:\/\/www.apta.com\/research\/info\/briefings\/documents\/maxey.pdf"},{"key":"1_CR22","unstructured":"Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security Analysis of a Cryptographically-Enabled RFID Device. In: USENIX Security Symposium, Baltimore, Maryland, USA, USENIX, pp. 1\u201316 (2005)"},{"key":"1_CR23","unstructured":"The Smart Card Alliance: Smart Card Talk Standards. The Smart Card Alliance Newsletter (2006) January issue"},{"key":"1_CR24","unstructured":"Washington Metropolitan Area Transit Authority: WMATA Privacy Policy Proposal. WWW (2006), http:\/\/www.wmata.com\/about\/parp2.cfm"},{"key":"1_CR25","unstructured":"Washington Metropolitan Area Transit Authority: WMATA Privacy Policy. WWW (2006), http:\/\/www.wmata.com\/about\/parp_docs\/pi_9_2_0.pdf"},{"key":"1_CR26","unstructured":"San Francisco Bay Area Rapid Transit District: Bay Area Rapid Transit (BART) Fiscal Year 2004 Annual Report. WWW (2006)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. CACM\u00a028 (1985)","DOI":"10.1145\/4372.4373"},{"key":"1_CR28","unstructured":"Guerineau, P.: Active RFID Technology Applied to Security Improvement and Statistical Control in Public Transit. In: Automatic Fare Collection. New Horizons in Public Transport with Smart Cards, Brussels, Belgium, International Union of Public Transport (2002)"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_14","volume-title":"Privacy Enhancing Technologies","author":"A. Juels","year":"2006","unstructured":"Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, Springer, Heidelberg (2006)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"McDaniel, T.L., Haendler, F.: Advanced RF Cards for Fare Collection. In: Commercial Applications and Dual-Use Technology Conference Proceedings, National Telesystems Conference, pp. 31\u201335 (1993)","DOI":"10.1109\/NTC.1993.293013"},{"key":"1_CR31","volume-title":"Conference on Computer and Communications Security \u2013 CCS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID Tags via Insubvertible Encryption. In: Conference on Computer and Communications Security \u2013 CCS 2005, Alexandria, Virginia, USA, ACM Press, New York (2005)"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11601494_14","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"J. Kang","year":"2005","unstructured":"Kang, J., Nyang, D.: RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"1_CR33","unstructured":"Ranasinghe, D., Engels, D., Cole, P.: Low-Cost RFID Systems: Confronting Security and Privacy. In: Auto-ID Labs Research Workshop, Zurich, Switzerland (2004)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Atluri, V. (ed.) 8th ACM Conference on Compuer and Communications Security, pp. 103\u2013111 (2003)","DOI":"10.1145\/948109.948126"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Attoh-Okine, N., Shen, L.: Security Issues of Emerging Smart Cards Fare Collection Application in Mass Transit. In: Vehicle Navigation and Information Systems Conference, pp. 523\u2013526 (1995)","DOI":"10.1109\/VNIS.1995.518887"},{"key":"1_CR36","first-page":"34","volume":"53","author":"L. Sim","year":"2004","unstructured":"Sim, L., Seow, E., Prakasam, S.: Implementing an Enhanced Integrated Fare System for Singapore. Public Transport International\u00a053, 34\u201337 (2004)","journal-title":"Public Transport International"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Neve, M., Peeters, E., Samyde, D., Quisquater, J.J.: Memories: A Survey of Their Secure Uses in Smart Cards. In: IEEE Security in Storage Workshop, pp. 62\u201372 (2003)","DOI":"10.1109\/SISW.2003.10004"},{"key":"1_CR38","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance - A Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 1\u201311 (1996)"},{"key":"1_CR39","unstructured":"Damg\u00e5rd, I., Dupont, K., Pedersen, M.\u00d8.: Unclonable Group Identification. Cryptology ePrint Archive, Report 2005\/170 (2005), http:\/\/eprint.iacr.org\/"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Burgess, J., Gallagher, B., Jensen, D., Levine, B.: Maxprop: Routing for vehicle-based disruption-tolerant networks. In: Proc. IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"1_CR41","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/989459.989483","volume-title":"MobiHoc 2004: Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing","author":"W. Zhao","year":"2004","unstructured":"Zhao, W., Ammar, M., Zegura, E.: A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks. In: MobiHoc 2004: Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, pp. 187\u2013198. ACM Press, New York (2004)"},{"key":"1_CR42","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/FTDCS.2003.1204352","volume-title":"FTDCS 2003: Proceedings of the The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003)","author":"W. Zhao","year":"2003","unstructured":"Zhao, W., Ammar, M.H.: Message Ferrying: Proactive Routing in Highly-Partitioned Wireless Ad Hoc Networks. In: FTDCS 2003: Proceedings of the The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), p. 308. IEEE Computer Society, Washington (2003)"},{"key":"1_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO 1988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, New York (1990)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:32Z","timestamp":1619508092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/11957454_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}