{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:34:34Z","timestamp":1725798874025},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111964"},{"type":"electronic","value":"9783319111971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11197-1_49","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T14:54:29Z","timestamp":1407941669000},"page":"632-643","source":"Crossref","is-referenced-by-count":1,"title":["A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags"],"prefix":"10.1007","author":[{"given":"Zhicai","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yongxiang","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yihan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","first-page":"1","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","author":"A.N. Nambiar","year":"2009","unstructured":"Nambiar, A.N.: RFID Technology: A Review of its Applications. In: Proceedings of the World Congress on Engineering and Computer Science, vol.\u00a0II, pp. 1\u20137. IAENG, Hong Kong (2009)"},{"key":"49_CR2","first-page":"1","volume":"10","author":"L.J. Gao","year":"2013","unstructured":"Gao, L.J., Ma, M.D., Shu, Y.T., Wei, Y.H.: An Ultralightweight RFID Authentication Protocol with CRC and Permutation. Journal of Network and Computer Applications\u00a010, 1\u201320 (2013)","journal-title":"Journal of Network and Computer Applications"},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"4248","DOI":"10.1016\/j.comcom.2008.05.006","volume":"31","author":"S.Y. Kang","year":"2008","unstructured":"Kang, S.Y., Lee, D.G., Lee, I.Y.: A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment. Computer Communications\u00a031, 4248\u20134254 (2008)","journal-title":"Computer Communications"},{"key":"49_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H.Y. Chien","year":"2007","unstructured":"Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces\u00a029, 254\u2013259 (2007)","journal-title":"Computer Standards & Interfaces"},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1102219.1102229","volume-title":"Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"S. Karthikeyan","year":"2005","unstructured":"Karthikeyan, S., Nesterenko, M.: RFID Security without Extensive Cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63\u201367. ACM, New York (2005)"},{"key":"49_CR7","first-page":"269","volume-title":"The 2006 Symposium on Cryptography and Information Security","author":"D.N. Duc","year":"2006","unstructured":"Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of Class 1 GEN-2 RFID Tag against Traceability and Cloning. In: The 2006 Symposium on Cryptography and Information Security, pp. 269\u2013277. Springer, Heidelberg (2006)"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.csi.2008.05.012","volume":"31","author":"P. Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. Computer Standards & Interfaces\u00a031, 372\u2013380 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.csi.2008.06.006","volume":"31","author":"D. Han","year":"2009","unstructured":"Han, D., Kwon, D.: Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces\u00a031, 648\u2013652 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"49_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-77090-9_5","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"N.W. Lo","year":"2007","unstructured":"Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol.\u00a04809, pp. 43\u201356. Springer, Heidelberg (2007)"},{"issue":"1","key":"49_CR11","first-page":"111","volume":"32","author":"T. Hu","year":"2012","unstructured":"Hu, T., Wei, G.H.: Anonymous Bidirectional RFID Authentication Protocol Based on Low-cost Tags. Journal of Computer Applications\u00a032(1), 111\u2013114 (2012)","journal-title":"Journal of Computer Applications"},{"key":"49_CR12","series-title":"Lecture Notes in Information Technology","first-page":"84","volume-title":"2012 International Conference on Affective Computing and Intelligent Interaction","author":"S. Oh","year":"2012","unstructured":"Oh, S., Shin, J., Jeong, C., Lee, J.: A Mutual Authentication Protocol in RFID Using CRC and Variable Certification Key. In: 2012 International Conference on Affective Computing and Intelligent Interaction. Lecture Notes in Information Technology, vol.\u00a010, pp. 84\u201389. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11197-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:36:15Z","timestamp":1558971375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11197-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111964","9783319111971"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11197-1_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}