{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:47:57Z","timestamp":1725490077181},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729082"},{"type":"electronic","value":"9783540729099"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72909-9_71","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T04:34:14Z","timestamp":1187670854000},"page":"644-653","source":"Crossref","is-referenced-by-count":2,"title":["A Design of Authentication Protocol for Multi-key RFID Tag"],"prefix":"10.1007","author":[{"given":"Jiyeon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jongjin","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Hoon","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Boyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Susan","family":"Joe","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yunseok","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Kyoonha","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"71_CR1","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices, Masters thesis, MIT (2003), \n                    \n                      http:\/\/theory.lcs.mit.edu\/~sweis\/masters.pdf"},{"key":"71_CR2","series-title":"Lecture Notes in Computer Science","first-page":"201","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2003","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013202. Springer, Heidelberg (2003)"},{"key":"71_CR3","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags, RFID Privacy Workshop (2003), \n                    \n                      http:\/\/www.frid.edu.com"},{"key":"71_CR4","first-page":"713","volume":"1","author":"J. Saito","year":"2004","unstructured":"Saito, J., Sakurai, K.: Variable ID Scheme of Anonymity in RFID tags. The 2004 Symposium on Cryptography and Information Security\u00a01, 713\u2013718 (2004)","journal-title":"The 2004 Symposium on Cryptography and Information Security"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103\u2013111 (2003)","DOI":"10.1145\/948109.948126"},{"key":"71_CR6","unstructured":"mCloak: Personal\/corporate management of wireless devices and technology (2003), \n                    \n                      http:\/\/www.mobilecloak.com"},{"key":"71_CR7","unstructured":"ISO\/IEC\/JTC 1\/SC 31, Information technology\u2013Radio frequency identification for item management\u2013Unique identification for RF tags, ISO\/IEC 15963 (2004)"},{"key":"71_CR8","unstructured":"Telecommunication Technology Association (TTA), Technical Report on Numbering an RFID tag, TTA Technical Report TTAR-06.0013 (2006)"},{"key":"71_CR9","unstructured":"IETF, The SEED Encryption Algorithm, IETF RFC 4269 (2005)"},{"volume-title":"RFID-Applications, Security and Privacy","year":"2005","key":"71_CR10","unstructured":"Garfinkel, S., Rosenberg, B. (eds.): RFID-Applications, Security and Privacy. Addison Wesley, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web and Network Technologies, and Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72909-9_71.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:51:12Z","timestamp":1619517072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72909-9_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540729082","9783540729099"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72909-9_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}