{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:09:59Z","timestamp":1764173399256,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717881"},{"type":"electronic","value":"9783540717898"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71789-8_9","type":"book-chapter","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T18:45:56Z","timestamp":1182969956000},"page":"80-89","source":"Crossref","is-referenced-by-count":15,"title":["LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System"],"prefix":"10.1007","author":[{"given":"JeaCheol","family":"Ha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"JungHoon","family":"Ha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Auto-ID Center. Draft Protocol Specification for a Class 0 Radio Frequency Identification Tag (February 2003)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: lightweight RFID protocol to protect against traceability and cloning attacks. Security and Privacy for Emerging Areas in Communications Networks-2005. In: SecureComm 2005, Sept. 2005, pp. 59\u201366 (2005)","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/PERCOMW.2004.1276922","volume-title":"Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communiations Workshops","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Hash-based Enhancement of Loaction Privacy for Radio Frequency Identification Devices using Varing Identifiers. In: Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communiations Workshops, pp. 149\u2013162. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. RSA Laboratories (2005)","DOI":"10.1145\/1023646.1023652"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"Proceeding of 10th ACM Conference on Computer and Communications Security\u201903","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceeding of 10th ACM Conference on Computer and Communications Security\u201903, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"9_CR6","unstructured":"Lee, S., Asano, T., Kim, K.: RFID Mutual Authentication Scheme based on Synchronized Secret Information. In: Proceedings of the SCIS\u201906 (2006)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/11562382","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S. Lee","year":"2005","unstructured":"Lee, S., et al.: Efficient Authentication for Low-cost RFID Systems. In: Gervasi, O., et al. (eds.) ICCSA 2005. LNCS, vol.\u00a03480, pp. 619\u2013627. Springer, Heidelberg (2005)"},{"key":"9_CR8","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS\u201904, pp. 719\u2013724 (2004)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., et al.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, Springer, Heidelberg (2005)"},{"key":"9_CR10","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Security Risks and Challenges. RSA Laboratories, vol. 6, no. 1 (2003)"},{"key":"9_CR11","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (2003)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., et al. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Convergence Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71789-8_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T22:43:16Z","timestamp":1737153796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71789-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717881","9783540717898"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71789-8_9","relation":{},"subject":[]}}