{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:17Z","timestamp":1726064297370},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_25","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"635-651","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Analysis of Provable Security Frameworks for RFID Security"],"prefix":"10.1007","author":[{"given":"Aakanksha","family":"Tewari","sequence":"first","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"publisher","first-page":"1682","DOI":"10.1109\/COMST.2017.2688411","volume":"19","author":"K Bu","year":"2017","unstructured":"Bu, K., Weng, M., Zheng, Y., Xiao, B., & Liu, X. (2017). You can clone but you can\u2019t hide: A survey of clone prevention and detection for RFID. IEEE Communications Surveys & Tutorials, 19(3), 1682\u20131700.","journal-title":"IEEE Communications Surveys & Tutorials"},{"volume-title":"The internet of things: From RFID to the next-generation pervasive networked systems","year":"2006","key":"25_CR2","unstructured":"Buckley, J. (Ed.). (2006). The internet of things: From RFID to the next-generation pervasive networked systems. New York: Auerbach Publications."},{"key":"25_CR3","unstructured":"Near Field Communications History. (2016). Timeline of RFID technology. Retrieved July, from http:\/\/www.nfcnearfieldcommunication.org\/timeline.html"},{"key":"25_CR4","unstructured":"Edwards, C. (2016). RFID tags along with the Internet of Things. Engineering and Technology Magazine 9(8). http:\/\/eandt.theiet.org\/magazine\/2014\/08\/tagging-along.cfm ."},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"SL Garfinkel","year":"2005","unstructured":"Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3), 34\u201343.","journal-title":"IEEE Security & Privacy"},{"issue":"11","key":"25_CR6","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770\u2013772.","journal-title":"Communications of the ACM"},{"key":"25_CR7","unstructured":"Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to privacy-friendly tags, RFID Privacy Workshop."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume":"2802","author":"SA Weis","year":"2004","unstructured":"Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security & Privacy Aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201\u2013212.","journal-title":"Security in Pervasive Computing"},{"key":"25_CR9","first-page":"149","volume-title":"International Workshop on Pervasive Computing and Communication Security PerSec, Orlando, Florida, USA","author":"A Henrici","year":"2004","unstructured":"Henrici, A., & Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In International Workshop on Pervasive Computing and Communication Security PerSec, Orlando, Florida, USA (pp. 149\u2013153)."},{"key":"25_CR10","isbn-type":"print","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/1030083.1030112","volume-title":"Conference on Computer and Communications Security\u2014ACM CCS, Washington, DC, USA","author":"D Molnar","year":"2004","unstructured":"Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Conference on Computer and Communications Security\u2014ACM CCS, Washington, DC, USA (pp. 210\u2013219). isbn:1-58113-961-6.","ISBN":"http:\/\/id.crossref.org\/isbn\/1581139616"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210\u2013223.","journal-title":"Pervasive and Mobile Computing"},{"key":"25_CR12","first-page":"115","volume-title":"Topics in cryptology (CT-RSA\u201906), LNCS 3860","author":"P Tuyls","year":"2006","unstructured":"Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Topics in cryptology (CT-RSA\u201906), LNCS 3860 (pp. 115\u2013131). New York: Springer."},{"key":"25_CR13","first-page":"97","volume-title":"IEEE International Conference on RFID","author":"YK Lee","year":"2008","unstructured":"Lee, Y. K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In IEEE International Conference on RFID (pp. 97\u2013104)."},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"Y Liao","year":"2013","unstructured":"Liao, Y., & Hsiao, C. (2013). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133\u2013146. https:\/\/doi.org\/10.1016\/j.adhoc.2013.02.004 .","journal-title":"Ad Hoc Networks"},{"key":"25_CR15","unstructured":"Peeters, R., & Hermans, J. (2013). Attack on Liao and Hsiao\u2019s secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Cryptology ePrint Archive, Report 2013\/399."},{"key":"25_CR16","first-page":"1","volume-title":"Advances in intelligent systems and applications","author":"Y Liao","year":"2013","unstructured":"Liao, Y., & Hsiao, C. (2013). A secure ECC-based RFID authentication scheme using hybrid protocols. In Advances in intelligent systems and applications (pp. 1\u201313). Berlin: Springer."},{"issue":"3","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0016-2","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z. (2014). A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. Journal of Medical Systems, 38(3), 1\u20139.","journal-title":"Journal of Medical Systems"},{"issue":"12","key":"25_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1\u201312.","journal-title":"Journal of Medical Systems"},{"issue":"3","key":"25_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., & Yang, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems, 39(3), 32. https:\/\/doi.org\/10.1007\/s10916-015-0221-7 .","journal-title":"Journal of Medical Systems"},{"key":"25_CR20","first-page":"412","volume-title":"Proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems (CHES), vol. 9813. Santa Barbara, CA, USA","author":"J Delvaux","year":"2016","unstructured":"Delvaux, J., Gu, D., Verbauwhede, I., Hiller, M., & Yu, M.-D. (2016). Efficient fuzzy extraction of PUF-induced secrets: Theory and applications. In Proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems (CHES), vol. 9813. Santa Barbara, CA, USA (pp. 412\u2013431)."},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2015.02.001","volume":"32","author":"M Akgun","year":"2015","unstructured":"Akgun, M., & Caglayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Network, 32, 32\u201342.","journal-title":"Ad Hoc Network"},{"key":"25_CR22","first-page":"556","volume-title":"Proceedings of the 17th International Conference on Cryptographic Hardware and Embedded Systems (CHES), vol. 9293. Saint-Malo, France","author":"E Aysu","year":"2015","unstructured":"Aysu, E., Gulcan, D., Moriyama, P. S., & Yung, M. (2015). End-to-end design of a PUF-based privacy preserving authentication protocol. In Proceedings of the 17th International Conference on Cryptographic Hardware and Embedded Systems (CHES), vol. 9293. Saint-Malo, France (pp. 556\u2013576)."},{"key":"25_CR23","first-page":"28","volume-title":"Proceedings of the International Conference on Information Security and Cryptology (ICISC)","author":"A Huth","year":"2017","unstructured":"Huth, A., Aysu, J., Guajardo, P. D., & G\u00fcneysu, T. (2017). Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA. In Proceedings of the International Conference on Information Security and Cryptology (ICISC) (pp. 28\u201348)."},{"key":"25_CR24","first-page":"134","volume-title":"Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","author":"Y Aysu","year":"2017","unstructured":"Aysu, Y., Wang, P. S., & Orshansky, M. (2017). New maskless debiasing method for lightweight physical unclonable function. In Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (pp. 134\u2013139)."},{"key":"25_CR25","first-page":"52","volume-title":"Secure human identification protocols, Advances in cryptology \u2013 ASYACRYPT\u20192001, lecture notes in computer science","author":"NJ Hopper","year":"2001","unstructured":"Hopper, N. J., & Blum, M. (2001). Secure human identification protocols, Advances in cryptology \u2013 ASYACRYPT\u20192001, lecture notes in computer science (Vol. 2248, pp. 52\u201366). Berlin: Springer."},{"key":"25_CR26","first-page":"278","volume-title":"Crypto-graphic primitives based on hard learning problems, advances in cryptology \u2013 CRYPTO\u201993, lecture notes in computer science","author":"MLF Blum","year":"1993","unstructured":"Blum, M. L. F., Kearns, M. J., & Lipton, R. J. (1993). Crypto-graphic primitives based on hard learning problems, advances in cryptology \u2013 CRYPTO\u201993, lecture notes in computer science (pp. 278\u2013291). Berlin: Springer."},{"key":"25_CR27","first-page":"293","volume-title":"Authenticating pervasive devices with human protocols, advances in cryptology \u2013 Crypto2005, lecture notes in computer science","author":"SW Juels","year":"2005","unstructured":"Juels, S. W. (2005). Authenticating pervasive devices with human protocols, advances in cryptology \u2013 Crypto2005, lecture notes in computer science (Vol. 3621, pp. 293\u2013308). Berlin: Springer."},{"key":"25_CR28","unstructured":"Katz, J., & Shin, J. S. (2005). Parallel and concurrent security of the HB and HB+ protocols, Cryptology ePrint archive, Report 2005\/461. http:\/\/eprint.iacr.org"},{"key":"25_CR29","unstructured":"Gilbert, H., Robshaw, M., & Silbert, H. (2005). An active attack against HB+: A provable secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005\/237. http:\/\/eprint.iacr.org"},{"issue":"4","key":"25_CR30","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H-Y Chien","year":"2007","unstructured":"Chien, H.-Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337\u2013340.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"25_CR31","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J., Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Printed handout of Workshop on RFID Security\u2014RFIDSec 06 July."},{"key":"25_CR32","first-page":"912","volume-title":"M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. Lecture notes in computer science","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J., & Ribagorda, A. (2006). M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. Lecture notes in computer science (pp. 912\u2013923). Berlin: Springer."},{"key":"25_CR33","first-page":"352","volume-title":"OTM Federated Conferences and Workshop: IS Workshop, IS\u201906, 4277. Lecture Notes in Computer Science","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: an efficient mutual authentication protocol for low-cost RFID tags. In OTM Federated Conferences and Workshop: IS Workshop, IS\u201906, 4277. Lecture Notes in Computer Science (pp. 352\u2013361). Berlin: Springer."},{"key":"25_CR34","first-page":"56","volume-title":"Proceedings of International Workshop on Information Security Applications","author":"P Peris-Lopez","year":"2008","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., & Ribagorda, A. (2008). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In Proceedings of International Workshop on Information Security Applications (pp. 56\u201368)."},{"key":"25_CR35","first-page":"68","volume-title":"Proceedings of 13th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT \u201907), vol. 4833 of Lecture Notes in Computer Science","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S. (2007). On privacy models for RFID. In Proceedings of 13th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT \u201907), vol. 4833 of Lecture Notes in Computer Science (pp. 68\u201387). Kuching: Springer."},{"key":"25_CR36","unstructured":"Ouafi, K. (2011). Security and privacy in RFID systems. Ph.D. thesis, EPFL, Lausanne, Switzerland."},{"key":"25_CR37","unstructured":"Vaudenay, S. (2010). Invited talk at RFIDSec 2010."},{"key":"25_CR38","unstructured":"Canard, S., Coisel, I., Etrog, J., & Girault, M. (2010). Privacy preserving RFID systems: model and constructions. Cryptology ePrint Archive, Report 2010\/405."},{"key":"25_CR39","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/RFID-TA.2010.5529920","volume-title":"Proceedings of IEEE International Conference on RFID-Technology and Applications (RFID-TA10)","author":"S Canard","year":"2010","unstructured":"Canard, S., Coisel, I., & Girault, M. (2010). Security of privacy preserving RFID systems. In Proceedings of IEEE International Conference on RFID-Technology and Applications (RFID-TA10) (pp. 269\u2013274)."},{"key":"25_CR40","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/1229285.1229319","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS \u201907)","author":"T Le van","year":"2007","unstructured":"van Le, T., Burmester, M., & de Medeiros, B. (2007). Universally composable and forward-secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS \u201907) (pp. 242\u2013252). Singapore: ACM."},{"key":"25_CR41","first-page":"342","volume-title":"Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom \u201907)","author":"A Juels","year":"2007","unstructured":"Juels, A., & Weis, S. A. (2007). Defining strong privacy for RFID. In Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom \u201907) (pp. 342\u2013347). New York, NY: IEEE."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T15:39:55Z","timestamp":1613317195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_25","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}