{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:33:01Z","timestamp":1742401981311},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_19","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T04:15:43Z","timestamp":1165810543000},"page":"332-350","source":"Crossref","is-referenced-by-count":27,"title":["Optimal Key-Trees for Tree-Based Private Authentication"],"prefix":"10.1007","author":[{"given":"Levente","family":"Butty\u00e1n","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tam\u00e1s","family":"Holczer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Istv\u00e1n","family":"Vajda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, Springer, Heidelberg (2006)"},{"key":"19_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: A Efficient Non-transferable Anonymous Multi-show Credential System with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, Springer, Heidelberg (2001)"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01(1), 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"19_CR6","unstructured":"Elektra Hungaria (In Hungarian), \n                    \n                      http:\/\/www.gkm.gov.hu\/data\/357863\/kovetelmeny1215.pdf"},{"key":"19_CR7","unstructured":"IKE, The Internet Key Exchange, RFC 2409, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2409.txt"},{"key":"19_CR8","unstructured":"ISO 9798-2. Mechanisms using symmetric encipherment algorithms, \n                    \n                      http:\/\/www.iso.org"},{"key":"19_CR9","unstructured":"Juels, A.: RFID security and privacy: a research survey. manuscript, condensed version will appear in the IEEE Journal on Selected Areas in Communication (September 2005)"},{"key":"19_CR10","unstructured":"Kerberos. RFC 1510, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc1510.txt"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the ACM Conference on Computer and Communications Security (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Nohara, Y., Inoue, S., Baba, K., Yasuura, H.: Quantitative Evaluation of Unlinkable ID Matching Schemes. In: Workshop on Privacy in the Electronic Society, WPES (2005)","DOI":"10.1145\/1102199.1102212"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability and pseudonymity \u2013 a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the Privacy Enhancing Technologies (PET) Workshop","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Proceedings of the Privacy Enhancing Technologies (PET) Workshop. LNCS, Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:21:36Z","timestamp":1619493696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11957454_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}