{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:50:05Z","timestamp":1760622605980},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_51","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T12:19:26Z","timestamp":1196079566000},"page":"550-556","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Mutual Authentication Protocol on RFID Tags"],"prefix":"10.1007","author":[{"given":"Hui-Feng","family":"Huang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"EPCglobal, \n                    \n                      http:\/\/www.EPCglobalinc.org\/"},{"key":"51_CR2","unstructured":"Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal GEN-2 FRID tag against traceability and cloning. In: The 2006 Symposium on Cryptography and Information Security (2006)"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE International Workshop on Pervasive Computing and Communication Security-PerSec, pp. 149\u2013153 (March 2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: International Conference on Computational Science and its Applications-ICCSA, pp. 619\u2013627 (May 2005)","DOI":"10.1007\/11424758_65"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63\u201367 (2005)","DOI":"10.1145\/1102219.1102229"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: ACM Conference on Computer and Communications Security-ACM CCS, pp. 210\u2013219 (October 2004)","DOI":"10.1145\/1030083.1030112"},{"key":"51_CR7","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop (November 2003)"},{"key":"51_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"The Proceedings of the First Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"51_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","volume-title":"International Conference on Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 70\u201384. Springer, Heidelberg (2005)"},{"key":"51_CR10","unstructured":"Yang, Y., Ren, K., Kim, K.: Security and privacy on authentication protocol for low-cost radio. In: The 2005 Symposium on Cryptography and Information Security (2005)"},{"key":"51_CR11","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H.Y. Chien","year":"2007","unstructured":"Chien, H.Y., Chen, C.H.: Mutul Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards and Interfaces\u00a029, 254\u2013259 (2007)","journal-title":"Computer Standards and Interfaces"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:48Z","timestamp":1619506728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_51","relation":{},"subject":[]}}