{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:55:31Z","timestamp":1725494131560},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767718"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76772-5_1","type":"book-chapter","created":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T14:16:26Z","timestamp":1194012986000},"page":"1-16","source":"Crossref","is-referenced-by-count":11,"title":["RFID Privacy Using Spatially Distributed Shared Secrets"],"prefix":"10.1007","author":[{"given":"Marc","family":"Langheinrich","sequence":"first","affiliation":[]},{"given":"Remo","family":"Marti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"EPCglobal: Class-1 generation-2 UHF RFID protocol for communications at 860 MHz\u2013960 MHz, version 1.0.9. EPC radio-frequency identity protocols (2005), see http:\/\/www.epcglobalinc.org\/standards\/Class_1_Generation_2_UHF_Air_Interface_Protocol_Standard_Version_1.0.9.pdf"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1102199.1102205","volume-title":"WPES 2005. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society","author":"G. Karjoth","year":"2005","unstructured":"Karjoth, G., Moskowitz, P.A.: Disabling RFID tags with visible confirmation: clipped tags are silenced. In: Atluri, V., Capitani, D., di Vimercati, S., Dingledine, R. (eds.) WPES 2005. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 27\u201330. ACM Press, Alexandria, VA (2005)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","first-page":"13","volume-title":"Proceedings of Pervasive 2007","author":"C. Roduner","year":"2007","unstructured":"Roduner, C., Langheinrich, M., Floerkemeier, C., Schwarzentrub, B.: Operating appliances with mobile phones \u2013 strengths and limits of a universal interaction device. In: Proceedings of Pervasive 2007, Toronto, Canada, May 13-16, 2007. LNCS, pp. 13\u201316. Springer, Heidelberg (2007)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"1_CR5","volume-title":"RFID: Applications, Security, and Privacy","author":"M. Ohkubo","year":"2005","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Garfinkel, S., Rosenberg, B. (eds.) RFID: Applications, Security, and Privacy, Addison-Wesley, Reading (2005)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-540-24646-6_16","volume-title":"Pervasive Computing","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Tackling security and privacy issues in radio frequency identification devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 219\u2013224. Springer, Heidelberg (2004)"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communication Security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 103\u2013111. ACM Press, Washington, D.C. (2003)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-540-30496-8_5","volume-title":"Security in Ad-hoc and Sensor Networks","author":"K. Fishkin","year":"2005","unstructured":"Fishkin, K., Roy, S., Jiang, B.: Some methods for privacy in RFID communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 42\u201353. Springer, Heidelberg (2005)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Langheinrich, M., Marti, R.: Practical minimalist cryptography for RFID privacy. Submitted for publication (2007), Available online at http:\/\/www.vs.inf.ethz.ch\/publ\/papers\/shamirtags07.pdf","DOI":"10.1109\/JSYST.2007.907683"},{"issue":"11","key":"1_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Comm. of the ACM"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Ambient Intelligence","author":"J. Bohn","year":"2004","unstructured":"Bohn, J., Mattern, F.: Super-distributed RFID tag infrastructures. In: Markopoulos, P., Eggen, B., Aarts, E., Crowley, J.L. (eds.) EUSAI 2004. LNCS, vol.\u00a03295, pp. 1\u201312. Springer, Heidelberg (2004)"},{"key":"1_CR13","unstructured":"EPCglobal: EPC tag data specification 1.1. EPCglobal Standard (2003)"},{"key":"1_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton, Florida (1996)"},{"issue":"3","key":"1_CR15","doi-asserted-by":"crossref","first-page":"267","DOI":"10.3233\/IFS-1994-2306","volume":"2","author":"S.L. Chiu","year":"1994","unstructured":"Chiu, S.L.: Fuzzy model identification based on cluster estimation. Journal of Intelligent and Fuzzy Systems\u00a02(3), 267\u2013278 (1994)","journal-title":"Journal of Intelligent and Fuzzy Systems"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76772-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T16:24:12Z","timestamp":1629995052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76772-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767718"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76772-5_1","relation":{},"subject":[]}}