{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:47:22Z","timestamp":1742982442767,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_16","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"145-153","source":"Crossref","is-referenced-by-count":1,"title":["Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID"],"prefix":"10.1007","author":[{"given":"Xinying","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Eric Ke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tsui-Ping","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"16_CR1","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y. Tian","year":"2012","unstructured":"Tian, Y., Chen, G., Li, J.: A new ultralightweight rfid authentication protocol with permutation. IEEE Communications Letters\u00a016(5), 702\u2013705 (2012)","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4236\/jsip.2013.41007","volume":"4","author":"C.M. Chen","year":"2013","unstructured":"Chen, C.M., Lin, Y.H., Chen, Y.H., Sun, H.M.: Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn. Journal of Information Hiding and Multimedia Signal Processing\u00a04(1), 57\u201372 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"5","key":"16_CR3","first-page":"1682","volume":"86","author":"K. Wei-Chi","year":"2003","unstructured":"Wei-Chi, K., Chien-Ming, C., Hui-Lung, L.: Cryptanalysis of a variant of peyravian-zunic\u2019s password authentication scheme. IEICE Transactions on Communications\u00a086(5), 1682\u20131684 (2003)","journal-title":"IEICE Transactions on Communications"},{"issue":"1","key":"16_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1002\/sec.522","volume":"6","author":"T.Y. Wu","year":"2013","unstructured":"Wu, T.Y., Tseng, Y.M.: Further analysis of pairing-based traitor tracing schemes for broadcast encryption. Security and Communication Networks\u00a06(1), 28\u201332 (2013)","journal-title":"Security and Communication Networks"},{"issue":"8","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/TIFS.2013.2270106","volume":"8","author":"C.M. Chen","year":"2013","unstructured":"Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Transactions on Information Forensics and Security\u00a08(8), 1318\u20131330 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"16_CR6","unstructured":"Hong, T.P., Lin, C.W., Yang, K.T., Wang, S.L.: Using tf-idf to hide sensitive itemsets. Applied Intelligence, 1\u20139 (2013)"},{"issue":"11","key":"16_CR7","first-page":"2519","volume":"85","author":"C. Chien-Ming","year":"2002","unstructured":"Chien-Ming, C., Wei-Chi, K.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Transactions on Communications\u00a085(11), 2519\u20132521 (2002)","journal-title":"IEICE Transactions on Communications"},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1049\/iet-ifs.2012.0105","volume":"7","author":"T.Y. Wu","year":"2013","unstructured":"Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Information Security\u00a07(3), 239\u2013246 (2013)","journal-title":"IET Information Security"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.eswa.2013.07.068","volume":"41","author":"C.M. Chen","year":"2014","unstructured":"Chen, C.M., Chen, Y.H., Lin, Y.H., Sun, H.M.: Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Systems with Applications\u00a041(2), 426\u2013433 (2014)","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"16_CR10","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TC.2011.46","volume":"60","author":"H.M. Sun","year":"2011","unstructured":"Sun, H.M., Wang, H., Wang, K.H., Chen, C.M.: A native apis protection mechanism in the kernel mode against malicious code. IEEE Transactions on Computers\u00a060(6), 813\u2013823 (2011)","journal-title":"IEEE Transactions on Computers"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol.\u00a04159, pp. 912\u2013923. Springer, Heidelberg (2006)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 352\u2013361. Springer, Heidelberg (2006)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID tags. In: Proc. of the 2nd Workshop on RFID Security (2006)","DOI":"10.1007\/11833529_93"},{"key":"16_CR14","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-0-387-72367-9_10","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"T. Li","year":"2007","unstructured":"Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 109\u2013120. Springer, Boston (2007)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.: Vulnerability Analysis of EMAP-an Efficient RFID Mutual Authentication Protocol. In: Proc. of the 2nd Inter. Conf. on Availability, Reliability and Security, pp. 238\u2013245 (2007)","DOI":"10.1109\/ARES.2007.159"},{"issue":"4","key":"16_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H.Y. Chien","year":"2007","unstructured":"Chien, H.Y.: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. on Dependable and Secure Computing\u00a04(4), 337\u2013340 (2007)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T. Cao","year":"2009","unstructured":"Cao, T., Bertino, E., Lei, H.: Security analysis of the sasi protocol. IEEE Transactions on Dependable and Secure Computing\u00a06(1), 73\u201377 (2009)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"16_CR18","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"H.M. Sun","year":"2009","unstructured":"Sun, H.M., Ting, W.C., Wang, K.H.: On the Security of Chien\u2019s Ultralightweight RFID Authentication Protocol. IEEE Trans. on Dependable and Secure Computing\u00a08(2), 315\u2013317 (2009)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"issue":"4","key":"16_CR19","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1109\/TDSC.2010.75","volume":"8","author":"P. D\u2019Arco","year":"2011","unstructured":"D\u2019Arco, P., De Santis, A.: On ultralightweight rfid authentication protocols. IEEE Transactions on Dependable and Secure Computing\u00a08(4), 548\u2013563 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"R.W. Phan","year":"2009","unstructured":"Phan, R.W.: Cryptanalysis of a New Ultralightweight RFID Authentication Protocol \u2013 SASI. IEEE Trans. on Dependable and Secure Computing\u00a06(4), 316\u2013320 (2009)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"key":"16_CR21","unstructured":"Hernandez-Castro, J.C., Tapiador, J.M., Peris-Lopez, P., Quisquater, J.J.: Cryptanalysis of the sasi ultralightweight rfid authentication protocol with modular rotations. arXiv preprint arXiv:0811.4257 (2008)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-00306-6_5","volume-title":"Information Security Applications","author":"P. Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol.\u00a05379, pp. 56\u201368. Springer, Heidelberg (2009)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Bilal, Z., Masood, A., Kausar, F.: Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In: International Conference on Network-Based Information Systems, NBIS 2009, pp. 260\u2013267. IEEE (2009)","DOI":"10.1109\/NBiS.2009.9"},{"key":"16_CR24","first-page":"6","volume":"1","author":"K.H. Yeh","year":"2010","unstructured":"Yeh, K.H., Lo, N.: Improvement of two lightweight rfid authentication protocols. Information Assurance and Security Letters\u00a01, 6\u201311 (2010)","journal-title":"Information Assurance and Security Letters"},{"key":"16_CR25","unstructured":"Tagra, D., Rahman, M., Sampalli, S.: Technique for preventing dos attacks on rfid systems. In: 2010 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 6\u201310. IEEE (2010)"},{"key":"16_CR26","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-04434-2_15","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"M. David","year":"2009","unstructured":"David, M., Prasad, N.R.: Providing strong security and high privacy in low-cost rfid networks. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol.\u00a017, pp. 172\u2013179. Springer, Heidelberg (2009)"},{"key":"16_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-16822-2_3","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"J.C. Hernandez-Castro","year":"2010","unstructured":"Hernandez-Castro, J.C., Peris-Lopez, P., Phan, R.C.W., Tapiador, J.M.: Cryptanalysis of the david-prasad rfid ultralightweight authentication protocol. In: Radio Frequency Identification: Security and Privacy Issues. Springer (2010) 22\u201334"},{"key":"16_CR28","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-25327-0_18","volume-title":"Informatics Engineering and Information Science","author":"A. Eghdamian","year":"2011","unstructured":"Eghdamian, A., Samsudin, A.: A secure protocol for ultralightweight radio frequency identification (rfid) tags. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds.) ICIEIS 2011, Part I. CCIS, vol.\u00a0251, pp. 200\u2013213. Springer, Heidelberg (2011)"},{"key":"16_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-36140-1_2","volume-title":"Radio Frequency Identification. Security and Privacy Issues","author":"G. Avoine","year":"2013","unstructured":"Avoine, G., Carpent, X.: Yet another ultralightweight authentication protocol that is broken. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol.\u00a07739, pp. 20\u201330. Springer, Heidelberg (2013)"},{"key":"16_CR30","unstructured":"Shao-hui, W., Zhijie, H., Sujuan, L., Dan-wei, C.: Security analysis of rapp an rfid authentication protocol based on permutation. Technical report, Cryptology ePrint Archive, Report 2012\/327 (2012)"},{"issue":"7","key":"16_CR31","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ipl.2013.01.003","volume":"113","author":"Z. Ahmadian","year":"2013","unstructured":"Ahmadian, Z., Salmasizadeh, M., Aref, M.R.: Desynchronization attack on rapp ultralightweight authentication protocol. Information Processing Letters\u00a0113(7), 205\u2013209 (2013)","journal-title":"Information Processing Letters"},{"key":"16_CR32","unstructured":"Zhuang, X., Wang, Z.H., Chang, C.C., Zhu, Y.: Security analysis of a new ultra-lightweight rfid protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing 4(3) (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T08:37:56Z","timestamp":1675240676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}