{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T15:45:48Z","timestamp":1772293548286,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_33","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"454-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":208,"title":["RFID Systems and Security and Privacy Implications"],"prefix":"10.1007","author":[{"given":"Sanjay E.","family":"Sarma","sequence":"first","affiliation":[]},{"given":"Stephen A.","family":"Weis","sequence":"additional","affiliation":[]},{"given":"Daniel W.","family":"Engels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, M. Burrows, C. Kaufman, and B. W. Lampson. Authentication and delegation with smart-cards, In Theoretical Aspects of Computer Software, pages 326\u2013345, 1991.","DOI":"10.1007\/3-540-54415-1_53"},{"key":"33_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Low cost attacks on tamper resistant devices","author":"R. Anderson","year":"1997","unstructured":"R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997."},{"key":"33_CR3","volume-title":"Broadband Wireless Access","author":"B. Bing","year":"2000","unstructured":"B. Bing. Broadband Wireless Access, Boston, Kluwer Academic Publishers, 2000."},{"key":"33_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"EUROCRYPT\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. In EUROCRYPT\u201997, volume 1233, pages 37\u201351. Lecture Notes in Computer Science, Advances in Cryptology, 1997."},{"key":"33_CR5","unstructured":"S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999."},{"key":"33_CR6","unstructured":"D. Engels. The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, 2001. \n                    http:\/\/www.autoidcenter.org\/research\/MIT-AUTOID-WH-007.pdf."},{"key":"33_CR7","unstructured":"K. Finkenzeller. RFID Handbook, John Wiley & Sons. 1999."},{"key":"33_CR8","unstructured":"H. Gobio., S. Smith, J.D. Tygar, and B. Yee. Smart cards in hostile environments. In 2nd USENIX Workshop on Elec. Commerce, 1996."},{"key":"33_CR9","series-title":"Lect Notes Comput Sci","volume-title":"NTRU: A ring-based public key cryptosystem","author":"J. Hoffstein","year":"1998","unstructured":"J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: A ring-based public key cryptosystem. Lecture Notes in Computer Science, volume 1423, 1998."},{"key":"33_CR10","unstructured":"International Telecommunications Union. Radio Regulations, Vol. 1, 1998."},{"key":"33_CR11","unstructured":"B.S. Kaliski Jr. and M.J.B. Robshaw. Comments on some new attacks on cryptographic devices. RSA Laboratories' Bulletin No. 5, July 14, 1997. Available from \n                    http:\/\/www.rsasecurity.com\/rsalabs\/bulletins\/."},{"key":"33_CR12","unstructured":"S. Sarma, K. Ashton, D. Brock. The Networked Physical World, Technical Report MIT-AUTOID-WH-001, 1999. \n                    http:\/\/www.autoidcenter.org\/research\/MITAUTOID-WH-001.pdf."},{"key":"33_CR13","unstructured":"S. Sarma. Towards the 5 cent Tag, Technical Report MIT-AUTOID-WH-006, 2001. \n                    http:\/\/www.autoidcenter.org\/research\/MIT-AUTOID-WH-006.pdf."},{"key":"33_CR14","unstructured":"T. Scharfeld. An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Indentification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institue of Technology, Cambridge, MA 02139, 2001."},{"key":"33_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-44499-8_24","volume-title":"Physical security devices for computer subsystems: A survey of attacks and defences","author":"S.H. Weigart","year":"2000","unstructured":"S.H. Weigart. Physical security devices for computer subsystems: A survey of attacks and defences. CHES 2000, Lecture Notes in Computer Science, volume 1965, pages 302\u2013317, 2000."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:25:21Z","timestamp":1558473921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}