{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:22:13Z","timestamp":1764174133003,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_10","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"147-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Secure Improved Cloud-Based RFID Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Abughazalah","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edn. John Wiley & Sons Inc, New York (2003)","edition":"2"},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H Chien","year":"2007","unstructured":"Chien, H., Chen, C.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interfaces 29(2), 254\u2013259 (2007)","journal-title":"Comput. Stand. Interfaces"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.: RFID authentication protocol for low-cost tags. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 140\u2013147. ACM (2008)","DOI":"10.1145\/1352533.1352556"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","volume":"7","author":"C Tan","year":"2008","unstructured":"Tan, C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 7(4), 1400\u20131407 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Poulopoulos, G., Markantonakis, K., Mayes, K.: A secure and efficient mutual authentication protocol for low-cost RFID systems. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 706\u2013711. IEEE (2009)","DOI":"10.1109\/ARES.2009.83"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Y., Jiao, B., Xu, Y.: An authentication protocol for secure and efficient RFID communication. In: 2010 International Conference on Logistics Systems and Intelligent Management, vol. 3, pp. 1648\u20131651. IEEE (2010)","DOI":"10.1109\/ICLSIM.2010.5461250"},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1587\/elex.8.50","volume":"8","author":"J Chun","year":"2011","unstructured":"Chun, J., Hwang, J., Lee, D.: RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electron. Express 8(2), 50\u201356 (2011)","journal-title":"IEICE Electron. Express"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1016\/j.eswa.2011.07.053","volume":"39","author":"E Yoon","year":"2012","unstructured":"Yoon, E.: Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Syst. Appl. 39(1), 1589\u20131594 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1002\/dac.1246","volume":"25","author":"CF Lee","year":"2012","unstructured":"Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3), 376\u2013385 (2012)","journal-title":"Int. J. Commun. Syst."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Xie, W., Xie, L., Zhang, C., Zhang, Q., Tang, C.: Cloud-based RFID authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168\u2013175. IEEE (2013)","DOI":"10.1109\/RFID.2013.6548151"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-79104-1_19","volume-title":"Information Security Practice and Experience","author":"K Ouafi","year":"2008","unstructured":"Ouafi, K., Phan, R.C.-W.: Privacy of recent RFID authentication protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 263\u2013277. Springer, Heidelberg (2008)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Casper: a compiler for the analysis of security protocols. In: Proceedings of 10th IEEE Computer Security Foundations Workshop, pp. 18\u201330 (1997)","DOI":"10.1109\/CSFW.1997.596779"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Alshehri, A., Briffa, J.A., Schneider, S., Wesemeyer, S.: Formal security analysis of NFC m-coupon protocols using casper\/fdr. In: 2013 5th International Workshop on Near Field Communication (NFC), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/NFC.2013.6482439"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Aiash, M., Mapp, G., Phan, R.W., Lasebae, A., Loo, J.: A formally verified device authentication protocol using Casper\/FDR. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1293\u20131298. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.27"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.protcy.2012.10.086","volume":"6","author":"VV Kumari","year":"2012","unstructured":"Kumari, V.V., Raju, K.K.: Formal verification of IEEE 802.11w authentication protocol. Procedia Technology 6, 716\u2013722 (2012). 2nd International Conference on Communication, Computing and Security [ICCCS-2012]","journal-title":"Procedia Technology"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:12:58Z","timestamp":1747851178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}