{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:53Z","timestamp":1740099233952,"version":"3.37.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_12","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"146-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Privacy Preserving RFID Based Access Control to Smart Buildings"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2921-9124","authenticated-orcid":false,"given":"Ahmed Raad","family":"Al-Sudani","sequence":"first","affiliation":[]},{"given":"Shang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Muhmmad","family":"Al-Khiza\u2019ay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"12","key":"12_CR1","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the internet of things: threats and challenges. Secur. Commun. Netw. 7(12), 2728\u20132742 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/JSYST.2013.2297707","volume":"10","author":"AH Celdr\u00e1n","year":"2016","unstructured":"Celdr\u00e1n, A.H., Clemente, F.J.G., P\u00e9rez, M.G., P\u00e9rez, G.M.: Secoman: a semantic-aware policy framework for developing privacy-preserving and context-aware smart applications. IEEE Syst. J. 10(3), 1111\u20131124 (2016)","journal-title":"IEEE Syst. J."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.future.2017.06.023","volume":"83","author":"P Gope","year":"2017","unstructured":"Gope, P., Amin, R., Islam, S.H., Kumar, N., Bhalla, V.K.: Lightweight and privacy-preserving RFID authentication scheme for distributed IOT infrastructure with secure localization services for smart city environment. Fut. Gener. Comput. Syst. 83, 629\u2013637 (2017)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Arjunan, P., et al.: Sensoract: a decentralized and scriptable middleware for smart energy buildings. In: 2015 IEEE 12th International Conference on Ubiquitous Intelligence And Computing and 2015 IEEE 12th International Conference on Autonomic and Trusted Computing and 2015 IEEE 15th International Conference on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom), pp. 11\u201319. IEEE (2015)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.27"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Das, A.K., Pathak, P.H., Jee, J., Chuah, C.-N., Mohapatra, P.: Non-intrusive multi-modal estimation of building occupancy (2017)","DOI":"10.1145\/3131672.3131680"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jnca.2016.09.012","volume":"76","author":"E Ahvar","year":"2016","unstructured":"Ahvar, E., Daneshgar-Moghaddam, N., Ortiz, A.M., Lee, G.M., Crespi, N.: On analyzing user location discovery methods in smart homes: a taxonomy and survey. J. Netw. Comput. Appl. 76, 75\u201386 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122\u2013129 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","volume":"7","author":"CC Tan","year":"2008","unstructured":"Tan, C.C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 7(4), 1400\u20131407 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to anrifd mutual authentication protocol and its extensions. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 51\u201358. ACM (2009)","DOI":"10.1145\/1514274.1514282"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.camwa.2012.02.025","volume":"69","author":"J-S Cho","year":"2015","unstructured":"Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 69(1), 58\u201365 (2015)","journal-title":"Comput. Math. Appl."},{"issue":"1","key":"12_CR11","first-page":"749","volume":"13","author":"AR Al-Sudania","year":"2018","unstructured":"Al-Sudania, A.R., Zhoub, W., Liuc, B., Almansoorid, A., Yange, M.: Detecting unauthorized RFID tag carrier for secure access control to a smart building. Int. J. Appl. Eng. Res. 13(1), 749\u2013760 (2018)","journal-title":"Int. J. Appl. Eng. Res."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:01:55Z","timestamp":1573070515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}