{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:55Z","timestamp":1761611215366},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_5","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"43-56","source":"Crossref","is-referenced-by-count":24,"title":["An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System"],"prefix":"10.1007","author":[{"given":"N. W.","family":"Lo","sequence":"first","affiliation":[]},{"given":"Kuo-Hui","family":"Yeh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H.-Y. Chien","year":"2007","unstructured":"Chien, H.-Y., Chen, C.-H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces\u00a029(2), 254\u2013259 (2007)","journal-title":"Computer Standards & Interfaces"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Henrici, D., M\u00fcller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec 2004. Workshop on Pervasive Computing and Communications Security at IEEE PerCom 2004, Orlando, Florida, USA PERCOMW (March 14-17, 2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"5_CR3","unstructured":"EPCglobal, http:\/\/www.EPCglobalinc.org\/"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing, pp. 201\u2013212 (2003)","DOI":"10.1007\/978-3-540-39881-3_18"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S.L. Garfinkel","year":"2005","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An overview of Problems and Proposed Solutions. IEEE Security & Privacy Magazine\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"5_CR6","unstructured":"Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of EPCglobal GEN-2 RFID Tag against Traceability and Cloning. In: The 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan (January 17-20, 2006)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Karthikeyan, S., Nesterenko, M.: RFID Security without Extensive Cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63\u201367 (2005)","DOI":"10.1145\/1102219.1102229"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: CCS 2004. Conference on Computer and Communications Security, pp. 210\u2013219 (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"5_CR9","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzki, K., Kinoshita, S.: Cryptographic Approach to Privacyfriendly Tags. In: RFID Privacy Workshop, MIT, MA (2003)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","volume-title":"Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 70\u201384. Springer, Heidelberg (2005)"},{"key":"5_CR11","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual Authentication Protocol for Low-cost RFID. In: The Encrypt Workshop on RFID and Lightweight Crypto (2005)"},{"key":"5_CR12","unstructured":"An, Y., Oh, S.: RFID System for User\u2019s Privacy Protection. In: Asia-Pacific Conference on Communications, pp. 516\u2013519 (2005)"},{"key":"5_CR13","unstructured":"Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, http:\/\/epcis.mit.edu\/CS\/files\/folders\/epcglobal\/entry21.aspx"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 11\u201312. Springer, Heidelberg (2006)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"SDM 2007. The 4th VLDB workshop on Secure Data Management","author":"N.W. Lo","year":"2007","unstructured":"Lo, N.W., Yeh, K.-H.: Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. In: SDM 2007. The 4th VLDB workshop on Secure Data Management, September. LNCS, Springer, Heidelberg (to appear, 2007)"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:58:47Z","timestamp":1619521127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_5","relation":{},"subject":[]}}