{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:56Z","timestamp":1761611216104},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770169"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77018-3_57","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T07:46:39Z","timestamp":1196063199000},"page":"574-583","source":"Crossref","is-referenced-by-count":7,"title":["Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP)"],"prefix":"10.1007","author":[{"given":"JeaCheol","family":"Ha","sequence":"first","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Gonzalez Nieto","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/11596042_97","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops","author":"E. Choi","year":"2005","unstructured":"Choi, E., Lee, S., Lee, D.: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops. LNCS, vol.\u00a03823, pp. 945\u2013954. Springer, Heidelberg (2005)"},{"key":"57_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11807964_38","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"J.P. Kaps","year":"2006","unstructured":"Kaps, J.P., Sunar, B.: Energy Comparison of AES and SHA-1 for Ubiquitous Computing. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol.\u00a04097, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"57_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/11915034_61","volume-title":"OTM 2006","author":"M. Feldhofer","year":"2006","unstructured":"Feldhofer, M., Rechberger, C.: A Case Against Currently Used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol.\u00a04277, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"57_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/PERCOMW.2004.1276922","volume-title":"Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., M\u00fcller, P.: Hash-based Enhancement of Location Privacy for Radio Frequency Identification Devices using Varying Identifiers. In: Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149\u2013162. IEEE, Los Alamitos (2004)"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceeding of 10th ACM Conference on Computer and Communications Security 2003, pp. 103\u2013111 (2003)","DOI":"10.1145\/948109.948126"},{"key":"57_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/11562382","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S. Lee","year":"2005","unstructured":"Lee, S., Hwang, Y., Lee, D., Lim, J.: Efficient Authentication for Low-cost RFID Systems. In: Gervasi, O., Gavrilova, M., Kumar, V., Lagan\u00e0, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03480, pp. 619\u2013627. Springer, Heidelberg (2005)"},{"key":"57_CR7","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS 2004, pp. 719\u2013724 (2004)"},{"key":"57_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, Springer, Heidelberg (2005)"},{"key":"57_CR9","unstructured":"National Institute of Standards and Technilogy(NIST) FIPS-180-2: Secure Hash Standard(SHS) (2002)"},{"key":"57_CR10","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Security Risks and Challenges. RSA Laboratories\u00a06(1) (Spring 2003)"},{"key":"57_CR11","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (2003)"},{"key":"57_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engles, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77018-3_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:53:47Z","timestamp":1619520827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77018-3_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770169"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77018-3_57","relation":{},"subject":[]}}