{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:40:09Z","timestamp":1749688809119,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_18","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"255-270","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Tag Path Authentication Protocol with Less Tag Memory"],"prefix":"10.1007","author":[{"given":"Hongbing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"issue":"1","key":"18_CR1","first-page":"602","volume":"2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: security without collision resistance. J. Cryptol. 2006(1), 602\u2013619 (2006)","journal-title":"J. Cryptol."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, Usa, November, pp. 43\u201353 (2009)","DOI":"10.1145\/1653662.1653669"},{"key":"18_CR3","unstructured":"Blass, E., Elkhiyaoui, K., Molva, R.: Tracker: security and privacy for RFID-based supply chains. In: NDSS 2011. The Internet Society (2011)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-642-31284-7_28","volume-title":"Applied Cryptography and Network Security","author":"S Cai","year":"2012","unstructured":"Cai, S., Deng, R.H., Li, Y., Zhao, Y.: A new framework for privacy of RFID path authentication. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 473\u2013488. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31284-7_28"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Buttyn, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN, pp. 21\u201332 (2003)","DOI":"10.1145\/986858.986862"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, pp. 83\u201393 (2003)","DOI":"10.1145\/986858.986870"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15497-3_1","volume-title":"Computer Security \u2013 ESORICS 2010","author":"RH Deng","year":"2010","unstructured":"Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1\u201318. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15497-3_1"},{"issue":"4","key":"18_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-319-21837-3_12","volume-title":"Wireless Algorithms, Systems, and Applications","author":"K Fan","year":"2015","unstructured":"Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y.: ULRAS: ultra-lightweight RFID authentication scheme for mobile device. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 114\u2013122. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-21837-3_12"},{"issue":"7","key":"18_CR10","doi-asserted-by":"crossref","first-page":"165: 1","DOI":"10.1007\/s10916-016-0521-6","volume":"40","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Nawaz, O., Mahmood, K., Chaudhry, S.A., Khan, M.K.: A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst. 40(7), 165: 1\u2013165: 7 (2016)","journal-title":"J. Med. Syst."},{"key":"18_CR11","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Efficient security mechanisms for routing protocols. In: Proceedings of NDSS, pp. 57\u201373 (2010)"},{"issue":"2","key":"18_CR12","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: Rfid security and privacy: a research survey. IEEE J. Select. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"1","key":"18_CR13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1609956.1609963","volume":"13","author":"A Juels","year":"2009","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. 13(1), 7 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"18_CR14","unstructured":"Koh, B.R., Schuster, E.W., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, pp. 23\u201328. Auto-ID Labs, MIT (2012)"},{"key":"18_CR15","unstructured":"Li, Y., Deng, R., Bertino, E.: RFID security and privacy, 381\u2013394 (1996)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: Bao, F., Miller, S. (eds.) ASIACCS 2007, pp. 234\u2013241. ACM (2007)","DOI":"10.1145\/1229285.1229318"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Ma, C., Li, Y., Deng, R.H., Li, T.: RFID privacy: relation between two notions, minimal condition, and efficient construction. In: ACM Conference on Computer and Communications Security, pp. 54\u201365 (2009)","DOI":"10.1145\/1653662.1653670"},{"key":"18_CR18","volume-title":"RFID Systems and Security and Privacy Implications","author":"SE Sarma","year":"2002","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. Springer, Heidelberg (2002)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Sivaranjani, A., Prasad, D.V.: Optimizing BGP performance and a novel routing table structure for fast routing access on multicores. In: International Conference on Communications and Signal Processing (2014)","DOI":"10.1109\/ICCSP.2014.6949945"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of RFID in anti-counterfeiting. In: Haddad, H., Liebrock, L.M., Omicini, A., Wainwright, R.L. (eds.) SAC 2005, pp. 1607\u20131612. ACM (2005)","DOI":"10.1145\/1066677.1067041"},{"key":"18_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"On Privacy Models for RFID","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. Springer, Heidelberg (2007)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, M., Smith, S.W., Nicol, D.M.: Aggregated path authentication for efficient BGP security. In: CCS 2010, pp. 128\u2013138 (2010)","DOI":"10.1145\/1102120.1102139"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:49Z","timestamp":1749686449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}