{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T21:40:09Z","timestamp":1737754809133,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":24,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387754932"},{"type":"electronic","value":"9780387754949"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75494-9_50","type":"book-chapter","created":{"date-parts":[[2007,12,27]],"date-time":"2007-12-27T01:39:36Z","timestamp":1198719576000},"page":"412-420","source":"Crossref","is-referenced-by-count":1,"title":["A Research on Issues Related to RFID Security and Privacy"],"prefix":"10.1007","author":[{"given":"Jongki","family":"Kim","sequence":"first","affiliation":[]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinhwan","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"50_CR1","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"A. Juels, RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communications, Vol. 24, NO.2, 2006, pp.381\u2013394.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"unstructured":"NIST. Guidance for Securing Radio Frequency Identification (RFID) Systems (Draft), Special Publication 800\u201398 (2006).","key":"50_CR2"},{"key":"50_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MC.2006.232","volume":"39","author":"S. Ortiz Jr","year":"2006","unstructured":"Sixto Ortiz Jr. How Secure Is RFID? IEEE COMPUTER SOCIETY, Computer Archive Vol. 39, 2006, pp.17\u201319.","journal-title":"Computer Archive"},{"key":"50_CR4","first-page":"159","volume":"4217","author":"P. Peris-Lopez","year":"2006","unstructured":"P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, RFID Systems: A Survey on Security Threats and Proposed Solutions, The 11th IFIP International Conference on Personal Wireless Communications-PWC\u2019 06, Vol. 4217, 2006, pp. 159\u2013170.","journal-title":"The 11th IFIP International Conference on Personal Wireless Communications-PWC\u2019 06"},{"unstructured":"L. Stegeman, Who\u2019s Afraid of the Big Bad Wolf? (Market Wire, 2004)","key":"50_CR5"},{"unstructured":"I. Vajda, and L. Buttyan, Lightweight Authentication Protocols for Low-Cost RFID Tags, Proceedings of the 2nd Workshop on Security in Ubiquitous Computing, 2003, pp. 1\u201310.","key":"50_CR6"},{"doi-asserted-by":"crossref","unstructured":"I. Kim, B. Lee, and H. Kim, Privacy Protection Based on User-defined Preferences in RFID System, International Conference on Advanced Communication Technology-ICACT\u201906, 2006, pp. 858\u2013862.","key":"50_CR7","DOI":"10.1109\/ICACT.2006.206098"},{"unstructured":"H. Lee, and J. Kim, Privacy Threats and Issues in Mobile RFID, Proceedings of the First International Conference on Availability, Reliability, and Security (ARES\u2019 2006). IEEE Computer Society (April, 2006).","key":"50_CR8"},{"key":"50_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S. L. Garfinkel","year":"2005","unstructured":"S. L. Garfinkel, A. Juels, and R. Pappu, RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, vol. 3, 2005, pp. 34\u201343.","journal-title":"IEEE Security and Privacy"},{"doi-asserted-by":"crossref","unstructured":"A. Juels, R. L. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, Proceedings of the 8th ACM Conference on Computer and Communications Security, 2003, pp. 103\u2013111.","key":"50_CR10","DOI":"10.1145\/948109.948126"},{"issue":"4","key":"50_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2006.1632651","volume":"44","author":"Y. Xiao","year":"2006","unstructured":"Y. Xiao, X. Shen, B. Sun, and L. Cai, Security and Privacy in RFID and Applications in Telemedicine, IEEE Communications Magazine, Vol. 44, No. 4, 2006, pp.64\u201372.","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"crossref","unstructured":"A. Juels, and J. Brainared, Soft blocking: Flexible Blocker Tags on the Cheap, Proceedings of Workshop on Privacy in the Electronic Society(WPES04), 2004, pp. 1\u20137.","key":"50_CR12","DOI":"10.1145\/1029179.1029181"},{"doi-asserted-by":"crossref","unstructured":"S. A. Weis, S. E. Sarma, L. Ronald Rivest, and W. Daiel Engels, Security and Privacy Aspects of Low-cost Radio Frequency Identification System, Proceedings of the 1st International Conference on Security in Pervasive Computing, 2003, pp. 201\u2013212.","key":"50_CR13","DOI":"10.1007\/978-3-540-39881-3_18"},{"unstructured":"M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic Approach to Privacy-friendly Tags,\u201d RFID Privacy Workshop (2003): http:\/\/www.rfidprivacy.us\/2003\/agenda.php .","key":"50_CR14"},{"unstructured":"S. L. Garfinkel, An RFID Bill of Rights, Technology Review, 2002, p. 35.","key":"50_CR15"},{"key":"50_CR16","first-page":"2007","volume":"8","author":"S. Kinoshita","year":"2003","unstructured":"S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, and M. Ohkubo, Low-cost RFID Privacy Protection Scheme, Journal of the International Planetarium Society, Vol. 8, 2003, pp.2007\u20132021.","journal-title":"Journal of the International Planetarium Society"},{"key":"50_CR17","first-page":"357","volume":"3156","author":"M. Feldhofer","year":"2004","unstructured":"M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Proceedings of Cryptographic Hardware and Embedded Systems-CHES\u201904, Vol. 3156 of LNCS, 2004, pp. 357\u2013370.","journal-title":"Proceedings of Cryptographic Hardware and Embedded Systems-CHES\u201904"},{"doi-asserted-by":"crossref","unstructured":"A. Juels, Yoking-proof\u2019s for RFID Tags, Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04), 2004, pp.138\u2013143.","key":"50_CR18","DOI":"10.1109\/PERCOMW.2004.1276920"},{"unstructured":"C. Floerkemeier, R. Schneider, and M. Langheinrich, Scanning With Purpose-Supporting the Fair Information Principles in RFID Protocols, Proceedings of the 2nd International Symposium on Ubiquitous Computing Systems, 2004, pp. 1\u20139.","key":"50_CR19"},{"key":"50_CR20","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/11506157_16","volume":"3574","author":"M. Rieback","year":"2005","unstructured":"M. Rieback, C. Cripo, and A. Tanenbaum, RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP2005), Vol. 3574 of LNCS, 2005, pp. 184\u2013194.","journal-title":"Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP2005)"},{"doi-asserted-by":"crossref","unstructured":"D. Molnar, A. Soppera, and D. Wagner, Privacy for RFID through Trusted Computing, Proceedings of Workshop on Privacy in the Electronic Society, 2005, pp. 31\u201334.","key":"50_CR21","DOI":"10.1145\/1102199.1102206"},{"doi-asserted-by":"crossref","unstructured":"D. Molnar, and D. Wagner, Privacy and Security in Library RFID: Issues, Practices, and Architectures, Proceedings of the 11thACM Conference on Computer and Communications Security, 2004, pp. 210\u2013219.","key":"50_CR22","DOI":"10.1145\/1030083.1030112"},{"doi-asserted-by":"crossref","unstructured":"S. A. Weis, Security Parallels Between People and Pervasive Devices, The 3rd IEEE Conference on Pervasive Computing and Communications Workshops-PERSEC\u201905, 2005, pp. 105\u2013109.","key":"50_CR23","DOI":"10.1109\/PERCOMW.2005.72"},{"key":"50_CR24","first-page":"84","volume":"3","author":"P. Eecke Van","year":"2005","unstructured":"P. Van Eecke, and G. Skouma, RFID and Privacy: A Difficult Marriage? Journal of Computer, Media and Telecommunications Law, Vol. 3, 2005, pp. 84\u201390.","journal-title":"Journal of Computer, Media and Telecommunications Law"}],"container-title":["IFIP International Federation for Information Processing","Integration and Innovation Orient to E-Society Volume 2"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75494-9_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T21:05:14Z","timestamp":1737752714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75494-9_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754932","9780387754949"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75494-9_50","relation":{},"subject":[]}}