{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:40:59Z","timestamp":1773380459002,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540243014","type":"print"},{"value":"9783540305989","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30598-9_11","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T15:44:35Z","timestamp":1294847075000},"page":"149-164","source":"Crossref","is-referenced-by-count":131,"title":["Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Security technology: Where\u2019s the smart money? The Economist, 69\u201370, February 9 (2002)"},{"key":"11_CR2","unstructured":"Prada\u2019s smart tags too clever? Wired News, October 27 (2002)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 26\u201345. Springer, Heidelberg (1998)"},{"key":"11_CR4","unstructured":"Benetton undecided on use of \u2018smart tags\u2019. Associated Press, April 8 (2003)"},{"key":"11_CR5","unstructured":"Collins, J.: The cost of Wal-Mart\u2019s RFID edict. RFID Journal, September 10 (2003)"},{"key":"11_CR6","unstructured":"Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week January 3 (2003), Referenced at, http:\/\/www.informationweek.com\/story\/IWK20030110S0028"},{"key":"11_CR7","volume-title":"1st European Workshop on Security in Ad-Hoc and Sensor Networks","author":"K.P. Fishkin","year":"2004","unstructured":"Fishkin, K.P., Roy, S., Jiang, B.: Some methods for privacy in rfid communication. In: 1st European Workshop on Security in Ad-Hoc and Sensor Networks. Springer, Heidelberg (2004) (to appear)"},{"key":"11_CR8","volume-title":"Second International Conference on Pervasive Computing","author":"K.P. Fishkin","year":"2004","unstructured":"Fishkin, K.P., Wang, M., Borriello, G.: A ubiquitous system for medication monitoring. In: Second International Conference on Pervasive Computing, Springer, Heidelberg (2004)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR10","unstructured":"Garfinkel, S.: An RFID Bill of Rights. Technology Review, 35 (October 2002)"},{"key":"11_CR11","volume-title":"Universal re-encryption for mixnets","author":"P. Golle","year":"2004","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. Springer, Heidelberg (2004) (to appear)"},{"key":"11_CR12","volume-title":"WPES 2004","author":"A. Juels","year":"2004","unstructured":"Juels, A., Brainard, J.: Soft blocking: Flexible blocker tags on the cheap. In: WPES 2004, ACM Press, New York (2004) (to appear)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"ACM CCS 2003","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Atluri, V. (ed.) ACM CCS 2003, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"11_CR15","unstructured":"Auto-ID Labs. 13.56 MHz ISM band class 1 radio frequency identification tag interference specification: Candidate recommendation, version 1.0.0. Technical Report MIT-AUTOID-WH-002, Auto-ID Labs (2003), Referenced at, http:\/\/www.autoidlabs.org"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Ma, L., Xu, Q., Yang, Y.: Organic non-volatile memory by controlling the dynamic copper-ion concentration within the organic layer. Nature (2003) (submitted)","DOI":"10.1063\/1.1763222"},{"key":"11_CR17","unstructured":"McCullagh, D.: RFID tags: Big Brother in small packages. CNet January 13 (2003), Referenced at, http:\/\/news.com.com\/2010-1069-980325.html"},{"key":"11_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM CCS 2004, ACM Press, New York (2004) (to appear)","DOI":"10.1145\/1030083.1030112"},{"key":"11_CR20","unstructured":"Associated Press. Libraries eye RFID to track books: Privacy issues raised as San Francisco plans chips\u2019 use. October 3 (2003)"},{"key":"11_CR21","unstructured":"RFID, privacy, and corporate data. RFID Journal June 2 (2003), Feature article. Referenced at www.rfidjournal.com on subscription basis"},{"key":"11_CR22","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes\u00a06(1)(2003)"},{"key":"11_CR23","unstructured":"Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, Auto-ID Labs (2001), Referenced at, http:\/\/www.autoidlabs.org\/"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"11_CR25","unstructured":"Shim, R.: Benetton to track clothing with ID chips. CNET, March 11 (2003), Referenced at, http:\/\/news.com.com\/2100-1019-992131.html"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013194. Springer, Heidelberg (2000)"},{"issue":"6","key":"11_CR27","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/40.977757","volume":"21","author":"K. Takaragi","year":"2001","unstructured":"Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro\u00a021(6), 43\u201349 (2001)","journal-title":"IEEE Micro"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: First International Conference on Security in Pervasive Computing (2003)","DOI":"10.1007\/978-3-540-39881-3_18"}],"container-title":["Lecture Notes in Computer Science","Security in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30598-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T00:03:09Z","timestamp":1712102589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30598-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540243014","9783540305989"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30598-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}