{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:10:45Z","timestamp":1761808245494,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129415"},{"type":"electronic","value":"9783030129422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_25","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"331-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A PUF-Based Destructive Private Mutual Authentication RFID Protocol"],"prefix":"10.1007","author":[{"given":"Cristian","family":"Hristea","sequence":"first","affiliation":[]},{"given":"Ferucio Lauren\u0163iu","family":"\u0162iplea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"issue":"C","key":"25_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2015.02.001","volume":"32","author":"M Akg\u00fcn","year":"2015","unstructured":"Akg\u00fcn, M., \u00c7aglayan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Netw. 32(C), 32\u201342 (2015)","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11277-018-5643-3","volume":"100","author":"A Arslan","year":"2018","unstructured":"Arslan, A., Karda\u015f, S., \u00c7olak, S.A., Ert\u00fcrk, S.: Are RNGs Achilles\u2019 heel of RFID security and privacy protocols? Wirel. Pers. Commun. 100(4), 1355\u20131375 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-16822-2_5","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"G Avoine","year":"2010","unstructured":"Avoine, G., Carpent, X., Martin, B.: Strong authentication and strong integrity (SASI) is not that strong. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 50\u201364. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-16822-2_5"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-16822-2_13","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"G Avoine","year":"2010","unstructured":"Avoine, G., Coisel, I., Martin, T.: Time measurement threatens privacy-friendly RFID authentication protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 138\u2013157. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-16822-2_13"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-85855-3_6","volume-title":"Security and Cryptography for Networks","author":"J Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable function. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77\u201391. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-85855-3_6"},{"unstructured":"Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: Conference on RFID Security (2008)","key":"25_CR6"},{"unstructured":"Canard, S., Coisel, I., Etrog, J., Girault, M.: Privacy-preserving RFID systems: model and constructions (2010). \n                    https:\/\/eprint.iacr.org\/2010\/405.pdf","key":"25_CR7"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","volume-title":"Computer Security \u2013 ESORICS 2011","author":"J Hermans","year":"2011","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568\u2013587. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-23822-2_31"},{"issue":"12","key":"25_CR9","doi-asserted-by":"publisher","first-page":"2888","DOI":"10.1109\/TMC.2014.2314127","volume":"13","author":"J Hermans","year":"2014","unstructured":"Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888\u20132902 (2014)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"6","key":"25_CR10","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1016\/j.jnca.2012.08.006","volume":"35","author":"S Karda\u015f","year":"2012","unstructured":"Karda\u015f, S., \u00c7elik, S., Yildiz, M., Levi, A.: PUF-enhanced offline RFID security and privacy. J. Netw. Comput. Appl. 35(6), 2059\u20132067 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-25286-0_6","volume-title":"RFID. Security and Privacy","author":"S Karda\u015f","year":"2012","unstructured":"Karda\u015f, S., Kiraz, M.S., Bing\u00f6l, M.A., Demirci, H.: A novel RFID distance bounding protocol based on physically unclonable functions. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 78\u201393. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-25286-0_6"},{"key":"25_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"R Maes","year":"2013","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-41395-7"},{"doi-asserted-by":"crossref","unstructured":"Paise, R.-I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, pp. 292\u2013299. ACM, New York (2008)","key":"25_CR13","DOI":"10.1145\/1368310.1368352"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-00306-6_5","volume-title":"Information Security Applications","author":"P Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56\u201368. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-00306-6_5"},{"key":"25_CR15","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-14452-3_13","volume-title":"Towards Hardware-Intrinsic Security","author":"A-R Sadeghi","year":"2010","unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Enhancing RFID security and privacy by physically unclonable functions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 281\u2013305. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-14452-3_13"},{"unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Workshop on Secure Component and System Identification (SECSI), vol. 110 (2010)","key":"25_CR16"},{"key":"25_CR17","volume-title":"Introduction to the Theory of Computation","author":"M Sipser","year":"2012","unstructured":"Sipser, M.: Introduction to the Theory of Computation. Cengage Learning, Boston (2012)"},{"unstructured":"Van Deursen, T., Radomirovic, S.: Attacks on RFID protocols (2008). \n                    http:\/\/eprint.iacr.org\/2008\/310","key":"25_CR18"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68\u201387. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-76900-2_5"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:39:41Z","timestamp":1558478381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}