{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:49Z","timestamp":1725518389380},"publisher-location":"Boston, MA","reference-count":7,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387848389"},{"type":"electronic","value":"9780387848396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-84839-6_37","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T00:45:29Z","timestamp":1219970729000},"page":"471-482","source":"Crossref","is-referenced-by-count":5,"title":["Improved Lightweight Mutual Authentication Protocol for RFID Systems"],"prefix":"10.1007","author":[{"given":"Gy\u00f6z\u00f6","family":"G\u00f3dor","sequence":"first","affiliation":[]},{"given":"M\u00e1ty\u00e1s","family":"Antal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1_37","unstructured":"Luo, Z., Chan, T., Li, J. S.: A Lightweight Mutual Authentication Protocol for RFID Networks. Proc. of the 2005 IEEE International Conference on e-Business Engineering (ICEBE\u201905), IEEE (2005)"},{"key":"37_CR2_37","unstructured":"Ohbuko, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201dPrivacy-Friendly\u201d Tag. RFID Privacy Workshop@MIT (2003)"},{"key":"37_CR3_37","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume":"2802","author":"S. A. Weis","year":"2004","unstructured":"Weis, S. A., Sarma, S. E., Rivest, R. L., Engels, D. W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in Pervasive Computing, LNCS 2802 (2004) 201-212","journal-title":"Security in Pervasive Computing, LNCS"},{"key":"37_CR4_37","first-page":"719","volume":"1","author":"M. Ohbuko","year":"2004","unstructured":"Ohbuko, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS2004), Vol. 1 (Jan. 2004) 719-724","journal-title":"Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS2004)"},{"key":"37_CR5_37","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographics protocols. Proceedings 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press (1990) 234-248","DOI":"10.1109\/RISP.1990.63854"},{"key":"37_CR6_37","first-page":"371","volume-title":"Lecture Notes in Computer Science","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P. and Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Bimal Roy and Willi Meier, editors, Lecture Notes in Computer Science. Springer-Verlag Heidelberg, (2004) 371-388"},{"key":"37_CR7_37","first-page":"382","volume":"3","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, Vol. 4., No. 3 (July 1982) 382-401","journal-title":"4., No."}],"container-title":["IFIP International Federation for Information Processing","Wireless and Mobile Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-84839-6_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:14:45Z","timestamp":1619655285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-84839-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387848389","9780387848396"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-84839-6_37","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}