{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:37:52Z","timestamp":1725514672404},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681595"},{"type":"electronic","value":"9783540681649"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68164-9_3","type":"book-chapter","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T10:48:34Z","timestamp":1212144514000},"page":"27-39","source":"Crossref","is-referenced-by-count":10,"title":["Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Avoine, G.: Bibliography on Security and Privacy in RFID Systems, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA (last update in Jun 2007), Available online at: http:\/\/lasecwww.epfl.ch\/~gavoine\/rfid\/"},{"issue":"4","key":"3_CR2","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H. Chien","year":"2007","unstructured":"Chien, H.: SASI: A new Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing\u00a04(4), 337\u2013340 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"3_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1278901.1278916","volume":"41","author":"H. Chien","year":"2007","unstructured":"Chien, H., Hwang, C.: Security of ultra-lightweight RFID authentication protocols and its improvements. ACM SIGOPS Operating Systems Review\u00a041(4), 83\u201386 (2007)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"8","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/JPROC.2007.900324","volume":"95","author":"A. Juels","year":"2007","unstructured":"Juels, A.: The Vision of Secure RFID. Proceedings of the IEEE\u00a095(8), 1507\u20131508 (2007)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"A. Juels","year":"2005","unstructured":"Juels, A., Pappu, R., Garfinkel, S.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.: Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. In: Proc. of the The Second International Conference on Availability, Reliability and Security, pp. 238\u2013245 (2007)","DOI":"10.1109\/ARES.2007.159"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: Proc. of the 22-nd IFIP SEC 2007 (May 2007)","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Proc. of the Second Workshop RFID Security, July11-14, Graz University of Technology (2006)","DOI":"10.1007\/11833529_93"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 352\u2013361. Springer, Heidelberg (2006)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol.\u00a04159, pp. 912\u2013923. Springer, Heidelberg (2006)"},{"key":"3_CR11","unstructured":"Sun, H., Ting, W., Wang, K.: On the Security of Chien\u2019s Ultralightweight RFID Authentication Protocol, eprint archieve, report 83 (February 25, 2008)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68164-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T15:56:54Z","timestamp":1684425414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68164-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540681595","9783540681649"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68164-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}