{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T05:23:03Z","timestamp":1777440183194,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540255215","type":"print"},{"value":"9783540320043","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_9","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"70-84","source":"Crossref","is-referenced-by-count":100,"title":["Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment"],"prefix":"10.1007","author":[{"given":"Keunwoo","family":"Rhee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Associated Press, Benetton undecided on use of \u2018smart tags\u2019 , April 8 (2003)"},{"key":"9_CR2","unstructured":"Auto-ID Center, 860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and Logical Communication Interface Specification Recommended Standard, Version 1.0.0, Technical Report MIT-AUTOID-TR007 (2002)"},{"key":"9_CR3","unstructured":"Auto-ID Center, 860MHz-930MHz Class 0 Radio Frequency Identification Tag Protocol Specification Candidate Recommendation, Version 1.0.0, Technical Report MIT-AUTOID-TR016 (2003)"},{"key":"9_CR4","unstructured":"CNET, Wal-Mart cancels \u2018smart shelf\u2019 trial (July 2003), http:\/\/www.cnet.com"},{"key":"9_CR5","unstructured":"EAN International and the Uniform Code Council, http:\/\/www.ean-int.org"},{"key":"9_CR6","unstructured":"EPCglobal, EPC Tag Data Standards Version 1.1 Rev.1.24, http:\/\/www.epcglobalinc.org"},{"key":"9_CR7","unstructured":"Federal Information Processing Standards (FIPS), Secure Hash Standard (SHA-1), Technical Report 180-1, National Institute of Standards and Technology(NIST), April 1995, supersedes FIPS PUB 180 (1993)"},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook","author":"K. Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (2003)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/PERCOMW.2004.1276922","volume-title":"Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004)","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), pp. 149\u2013153. IEEE, Los Alamitos (2004)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103\u2013111 (2003)","DOI":"10.1145\/948109.948126"},{"key":"9_CR12","volume-title":"Modern Cryptography Theory and Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography Theory and Practice. Prentice Hall PTR, Englewood Cliffs (2004)"},{"key":"9_CR13","unstructured":"mCloak: Personal\/corporate management of wireless devices and technology (2003), http:\/\/www.mobilecloak.com"},{"key":"9_CR14","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS 2004, pp. 719\u2013724 (2004)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 Message Digest Algorithm. Technical Report RFC 1321, MIT Lab for Computer Science and RSA Laboratories (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"9_CR16","unstructured":"Sarma, S., Brock, D.L., Ashton, K.: The Networked Physical World Proposals for Engineering the Next Generation of Computing, Commerce and Automatic-Identification., Technical Report MIT-AUTOID-WH-001 (2001)"},{"key":"9_CR17","unstructured":"Sarma, S.: Towards the 5 cent Tag, Technical Report MIT-AUTOID-WH-006 (2001)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, Security and Privacy Implications., White Paper MIT-AUTOID-WH-014, MIT AUTO-ID CENTER (2002)","DOI":"10.1007\/3-540-36400-5_33"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"issue":"1","key":"9_CR20","first-page":"2","volume":"6","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes\u00a06(1), 2\u20139 (Spring 2003)","journal-title":"RSA Laboratories Cryptobytes"},{"key":"9_CR21","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis. MIT, Cambridge (2003)"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T20:26:30Z","timestamp":1740255990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}