{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:04:56Z","timestamp":1742385896491},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_13","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"176-190","source":"Crossref","is-referenced-by-count":52,"title":["Provably Secure Grouping-Proofs for RFID Tags"],"prefix":"10.1007","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[]},{"given":"Breno","family":"de Medeiros","sequence":"additional","affiliation":[]},{"given":"Rossana","family":"Motta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"92","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 92\u2013101. ACM, New York (2005)"},{"key":"13_CR2","first-page":"110","volume-title":"3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops)","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), pp. 110\u2013114. IEEE Computer Society, Los Alamitos (2005)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogawa, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., Rose, G.: Generalized Yoking-Proofs for a group of Radio Frequency Identification Tags. In: International Conference on Mobile and Ubiquitous Systems, MOBIQUITOUS 2006, San Jose, CA (2006)","DOI":"10.1109\/MOBIQW.2006.361727"},{"key":"13_CR5","unstructured":"Bono, S.C., Green, M., Stubblefield, A., Juels, A., Rubin, A.D., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: Proc. USENIX Security Symposium (USENIX Security 2005), pp. 1\u201316. USENIX (2005)"},{"key":"13_CR6","volume-title":"Proceedings of the 2nd IEEE\/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006)","author":"M. Burmester","year":"2006","unstructured":"Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE\/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, Los Alamitos (2006)"},{"key":"13_CR7","volume-title":"Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks (SECURECOMM 2005)","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks (SECURECOMM 2005). IEEE Press, Los Alamitos (2005)"},{"key":"13_CR8","volume-title":"Proc. Intern. Conf. on Pervasive Computing and Communications, (PerCom 2006)","author":"T. Dimitriou","year":"2006","unstructured":"Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press, Los Alamitos (2006)"},{"key":"13_CR9","first-page":"89","volume-title":"Proceedings of Second Annual Conference on Privacy, Security and Trust (PST 2004)","author":"S.J. Engberg","year":"2004","unstructured":"Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience. In: Proceedings of Second Annual Conference on Privacy, Security and Trust (PST 2004), October 13-15, 2004, pp. 89\u2013101. Wu Centre, University of New Brunswick, Fredericton (2004)"},{"key":"13_CR10","unstructured":"EPC Global. EPC tag data standards, vs.\u00a01.3, \n                  \n                    http:\/\/www.epcglobalinc.org\/standards\/EPCglobal_Tag_Data_Standard_TDS_%Version_1.3.pdf"},{"key":"13_CR11","unstructured":"ISO\/IEC, \n                  \n                    http:\/\/www.hightechaid.com\/standards\/18000.htm"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/PERCOMW.2004.1276920","volume-title":"PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops","author":"A. Juels","year":"2004","unstructured":"Juels, A.: Yoking-Proofs for RFID tags. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138\u2013142. IEEE Computer Society, Washington (2004)"},{"key":"13_CR13","first-page":"242","volume-title":"Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007)","author":"T. Le Van","year":"2007","unstructured":"Van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Bao, F., Miller, S. (eds.) Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 20-22, 2007, pp. 242\u2013252. ACM, New York (2007)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897. Springer, Heidelberg (2006)"},{"key":"13_CR15","unstructured":"Oren, Y., Shamir, A.: Power analysis of RFID tags. In: RSA Conference, Cryptographer\u2019s Track (RSA-CT 2006) (2006), \n                  \n                    http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid"},{"key":"13_CR16","volume-title":"Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerl 2007","author":"P. Peris-Lopez","year":"2007","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerl 2007, Istambul, Turkey, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"13_CR17","volume-title":"IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing \u2013 SecPerU 2006","author":"S. Piramuthu","year":"2006","unstructured":"Piramuthu, S.: On existence proofs for multiple RFID tags. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing \u2013 SecPerU 2006, Lyon, France, June 2006. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"13_CR18","first-page":"621","volume-title":"19th International Conference on Advanced Information Networking and Applications (AINA 2005)","author":"J. Saito","year":"2005","unstructured":"Saito, J., Sakurai, K.: Grouping Proof for RFID Tags. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, 28-30 March 2005, pp. 621\u2013624. IEEE Computer Society, Los Alamitos (2005)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/PERCOM.2007.30","volume-title":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007)","author":"C.C. Tan","year":"2007","unstructured":"Tan, C.C., Sheng, B., Li, Q.: Severless Search and Authentication Protocols for RFID. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), White Plains, New York, USA, 19-23 March 2007, pp. 3\u201312. IEEE Computer Society, Los Alamitos (2007)"},{"key":"13_CR21","first-page":"640","volume-title":"4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops)","author":"G. Tsudik","year":"2006","unstructured":"Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), Pisa, Italy, 13-17 March 2006, pp. 640\u2013643. IEEE Computer Society, Los Alamitos (2006)"},{"key":"13_CR22","unstructured":"Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost RFID tags. In: Proc. Workshop on Security in Ubiquitous Computing (UBICOMP 2003) (2003)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T04:12:04Z","timestamp":1547871124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}