{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T03:40:03Z","timestamp":1748403603167,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319197128"},{"type":"electronic","value":"9783319197135"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19713-5_31","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T13:19:45Z","timestamp":1432646385000},"page":"367-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient RFID Distance Bounding Protocol"],"prefix":"10.1007","author":[{"given":"Li","family":"Zhai","sequence":"first","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"31_CR1","unstructured":"Desmedt, Y.: Major security problems with the unforgeable(feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, vol. 88, pp. 15\u201317 (1988)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology\u2014CRYPTO \u201987","author":"YG Desmedt","year":"1988","unstructured":"Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21\u201339. Springer, Heidelberg (1988)"},{"issue":"3","key":"31_CR3","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BF00196726","volume":"4","author":"S Bengio","year":"1991","unstructured":"Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.J.: Secure implementation of identification systems. J. Cryptol. 4(3), 175\u2013183 (1991)","journal-title":"J. Cryptol."},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology\u2014EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks. SecureComm 2005, pp. 67\u201373. IEEE (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"issue":"9","key":"31_CR6","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1002\/wcm.590","volume":"8","author":"J Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance bounding protocols for rfid enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput. 8(9), 1227\u20131232 (2008)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-10628-6_20","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2009","author":"G Avoine","year":"2009","unstructured":"Avoine, G., Floerkemeier, C., Martin, B.: RFID distance bounding multistate enhancement. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 290\u2013307. Springer, Heidelberg (2009)"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-642-38631-2_33","volume-title":"Network and System Security","author":"Y Zhuang","year":"2013","unstructured":"Zhuang, Y., Yang, A., Wong, D.S., Yang, G., Xie, Q.: A highly efficient RFID distance bounding protocol without real-time PRF evaluation. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 451\u2013464. Springer, Heidelberg (2013)"},{"issue":"5","key":"31_CR9","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TWC.2011.030411.101158","volume":"10","author":"CH Kim","year":"2011","unstructured":"Kim, C.H., Avoine, G.: RFID distance bounding protocols with mixed challenges. IEEE Trans. Wirel. Commun. 10(5), 1618\u20131626 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Jannati, H., Falahati, A.: Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks. Wirel. Pers. Commun. 1\u201323 (2013)","DOI":"10.1007\/s11277-013-1498-9"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-04474-8_21","volume-title":"Information Security","author":"G Avoine","year":"2009","unstructured":"Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID\u00a0authentication\u00a0protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250\u2013261. Springer, Heidelberg (2009)"},{"issue":"2","key":"31_CR12","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3233\/JCS-2010-0408","volume":"19","author":"G Avoine","year":"2011","unstructured":"Avoine, G., Bingl, M.A., Karda, S., Lauradoux, C., Martin, B.: A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2), 289\u2013317 (2011)","journal-title":"J. Comput. Secur."}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19713-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T03:10:53Z","timestamp":1748401853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19713-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319197128","9783319197135"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19713-5_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}