{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:20:03Z","timestamp":1742970003399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223533"},{"type":"electronic","value":"9783030223540"}],"license":[{"start":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T00:00:00Z","timestamp":1561075200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22354-0_57","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T07:02:51Z","timestamp":1561014171000},"page":"637-645","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis and Design of Group RFID Tag Security Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Ke","family":"Zang","sequence":"first","affiliation":[]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"57_CR1","unstructured":"Fu, W., Qian, Z.H., Cheng, C., et al.: Anti-collision algorithm for bit arbitration query tree based on grouping mechanism[J]. J. Commun. 37, 41\u201368 (2016)"},{"key":"57_CR2","unstructured":"Yu, L.L., Zhang, L., Li, J., et al.: A PSO clustering based RFID middleware[C], pp. 222\u2013225. IEEE, New York (2018)"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Akg\u00fcn, M., \u00c7a\u01e7layan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, pp. 32\u201342 (2015)","DOI":"10.1016\/j.adhoc.2015.02.001"},{"key":"57_CR4","unstructured":"Zhang, X., Han, D., Cao, G., et al.: RFID security authentication protocol based on present algorithm[J]. J. Commun. 36, 65\u201374 (2015)"},{"key":"57_CR5","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TMC.2018.2793219","volume":"17","author":"X Liu","year":"2018","unstructured":"Liu, X., Xie, X., Zhao, X., et al.: Fast identification of blocked RFID tags[J]. IEEE Trans. Mob. Comput. 17, 2041\u20132054 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"57_CR6","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TNET.2016.2631517","volume":"25","author":"M Chen","year":"2018","unstructured":"Chen, M., Chen, S., Fang, Y.: Lightweight anonymous authentication protocols for RFID systems[J]. IEEE-ACM Trans. on Networking 25, 1475\u20131488 (2018)","journal-title":"IEEE-ACM Trans. on Networking"},{"key":"57_CR7","unstructured":"Yang, Y.L., Peng, C.G., Zhou, Z., et al.: Mobile RFID security authentication protocol based on Edwards curve[J]. J. Commun. 351, 32\u2013138\u2009+\u2009145 (2016)"},{"key":"57_CR8","unstructured":"Yuan, B.Q., Liu, J.Q.: Proof of security of RFID tag ownership transfer protocol[J]. J. Commun. 36, 83\u201390 (2015)"},{"key":"57_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11277-013-1358-7","volume":"75","author":"MH Dehkordi","year":"2014","unstructured":"Dehkordi, M.H., Farzaneh, Y.: Improvement of the hash-based RFID mutual authentication protocol. Wireless Pers. Commun. 75, 219\u2013232 (2014)","journal-title":"Wireless Pers. Commun."},{"key":"57_CR10","unstructured":"Alavi, S.M., Baghery, K., Abdolmaleki, B.: Traceability analysis of recent RFID authentication protocols. Wireles Pers. Commun. 83, 1663\u20131682 (2015)"},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Fan, K., Gong, Y., Liang, C., et al.: Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Network, 3095\u20133104 (2016)","DOI":"10.1002\/sec.1314"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Aghili, S.F., Ashouri-Talouki, M., Mala, H.: DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomputing, 509\u2013525 (2018)","DOI":"10.1007\/s11227-017-2139-y"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Farash, M.S., Nawaz, O., Mahmood, K., et al.: A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst, 165\u2013171 (2016)","DOI":"10.1007\/s10916-016-0521-6"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Sundaresan, S., Doss, R., Piramuthu, S., et al.: Secure tag search in RFID systems using mobile readers. IEEE Trans. Dependable Secure Comput. 230\u2013242 (2015)","DOI":"10.1109\/TDSC.2014.2302305"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Jannati, H., Bahrak, B.: Security analysis of an RFID tag search protocol. Inf. Process. Lett. 618\u2013622 (2016)","DOI":"10.1016\/j.ipl.2016.05.001"},{"key":"57_CR16","unstructured":"Pourpouneh, M., Ramezanian, R., Salahi, F.: An improvement over a server-less RFID authentication protocol. Int. J. Comput. Network Inf. Secur. 65\u2013171 (2014)"},{"key":"57_CR17","unstructured":"Shahrbabak, M.M., Abdolmaleky, S.: SRMAP and ISLAP authentication protocols: attack and improvements. IACR Cryptology ePrint Archive, 731\u2013741 (2016)"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Shen, J., Tan, H., Zhang, Y., et al.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 761\u2013783 (2017)","DOI":"10.1007\/s11042-017-4386-6"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22354-0_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:41:09Z","timestamp":1561758069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22354-0_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,21]]},"ISBN":["9783030223533","9783030223540"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22354-0_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,6,21]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}