{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:27:45Z","timestamp":1745386065388,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_20","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"227-238","source":"Crossref","is-referenced-by-count":14,"title":["Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor"],"prefix":"10.1007","author":[{"given":"Song","family":"Han","sequence":"first","affiliation":[]},{"given":"Vidyasagar","family":"Potdar","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: The 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, March 8th, pp. 110\u2013114 (2005)","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"20_CR2","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-friendly Tags. In: RFID Privacy Workshop, MIT, Cambridge (2003)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist Cryptography for RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, Springer, Heidelberg (2005)"},{"key":"20_CR4","unstructured":"Vajda, I., Butty\u2019an, L.: Lightweight authentication protocols for low-cost RFID tags. In: 2nd Workshop on Security in Ubiquitous Computing (2003)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Henrici, D., M\u0171ller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Workshop on Pervasive Computing and Communications Security (2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. Financial Cryptography (2005)","DOI":"10.1007\/11507840_14"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices, and Architectures. In: ACM Conference on Computer and Communication Security (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, Springer, Heidelberg (2004)"},{"key":"20_CR9","unstructured":"Sean, W., Thomas, L.: Automatic identification and data collection technologies in the transportation industry: Barcode and RFID. Technical Report (2001)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. In: Technicalreport MIT-AUTOID-WH-014, AutoID center, MIT, Cambridge (2002)","DOI":"10.1007\/3-540-36400-5_33"},{"key":"20_CR11","unstructured":"Lee, S., Lee, H., Asano, T., Kim, K.: Enhanced RFID Mutual Authentication Scheme based on Synchronized Secret Information. AUTO-ID Labs White Paper, WP-HARDWARE-032 (2006)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. In: International Conference on Security and Privacy for Emerging Areas in Communication Networks- SecComm (September 2005)","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Jules, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. In: ACM Conference on Computer and Communication Security \u2013 ACM CCS, pp. 103\u2013111 (October 2003)","DOI":"10.1145\/948125.948126"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient Authentication for Low-Cost RFID Systems. In: International Conference on Computational Science and Its Applications \u2013 ICCSA, pp. 619\u2013627 (May 2005)","DOI":"10.1007\/11424758_65"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In: Proceedings of International Workshop on Security in Ubiquitous Computing Systems (December 2005)","DOI":"10.1007\/11596042_97"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:22:28Z","timestamp":1737397348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_20","relation":{},"subject":[]}}