{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:56:29Z","timestamp":1761807389576},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_10","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"109-120","source":"Crossref","is-referenced-by-count":84,"title":["Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Ticyan","family":"Li","sequence":"first","affiliation":[]},{"given":"Guilin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"M. Aigner and M. Feldhofer. Secure Symmetric Authentication for RFID Tags. Telecommunication and Mobile Computing, March 2005."},{"key":"10_CR2","unstructured":"G. Avoine. Security and Privacy in RFID Systems, http:\/\/lasecwww.epfl.ch\/gavoine\/rfid"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"B. Defend, K. Fu and A. Juels. Cryptanalysis of Two Lightweight RFID Authentication Schemes. In: Proc. of PERSEC\u201907, March 2007.","DOI":"10.1109\/PERCOMW.2007.34"},{"key":"10_CR4","unstructured":"A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC\u201903, LNCS 2742, pp. 103\u2013121. Springer-Verlag, 2003."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In: Proc. of SCN\u201904, LNCS 3352, pp. 149\u2013164. Springer-Verlag, 2004.","DOI":"10.1007\/978-3-540-30598-9_11"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO\u201905, LNCS 3126, pp. 293\u2013308. Springer-Verlag, 2005.","DOI":"10.1007\/11535218_18"},{"issue":"2","key":"10_CR7","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"A. Juels. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications, 24(2): 381\u2013394, Feb. 2006.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"H. Lipmaa and S. Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In: Proc. of FSE\u2019 01, LNCS 2355, pp. 336\u2013350. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-45473-X_28"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Proc. of CCS\u201904, pp. 210\u2013219. ACM Press, 2004.","DOI":"10.1145\/1030083.1030112"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"D. Molnar, A. Soppera, and D. Wagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Proc. of SAC\u201905, LNCS 3897, pp. 276\u2013290. Springer-Verlag, 2005.","DOI":"10.1007\/11693383_19"},{"key":"10_CR11","unstructured":"M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacyfriendly tags. In: Proc. of RFID Privacy Workshop, 2003."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Proc. of 2nd Workshop on RFID Security, July 2006. http:\/\/events.iaik.tugraz.at\/RFIDSecO6 .","DOI":"10.1007\/11833529_93"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Proc. of International Conference on Ubiquitous Intelligence and Computing UIC\u201906, LNCS 4159, pp. 912\u2013923. Springer-Verlag, 2006.","DOI":"10.1007\/11833529_93"},{"key":"10_CR14","unstructured":"I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP\u201903, 2003."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of lowcost radio frequency identification systems. In: Proc. of 1st Int. Conf. on Security in Pervasive Computing, LNCS 2802, pp. 201\u2013212. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC\u201905, pp. 105\u2013109. IEEE Computer Society Press, 2005.","DOI":"10.1109\/PERCOMW.2005.72"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T13:33:58Z","timestamp":1684071238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_10","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}