{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:08:34Z","timestamp":1769724514378,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540858928","type":"print"},{"value":"9783540858935","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_20","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"267-282","source":"Crossref","is-referenced-by-count":76,"title":["A Practical Attack on the MIFARE Classic"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"de Koning Gans","sequence":"first","affiliation":[]},{"given":"Jaap-Henk","family":"Hoepman","sequence":"additional","affiliation":[]},{"given":"Flavio D.","family":"Garcia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook","author":"K. Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID Handbook, 2nd edn. John Wiley and Sons, Chichester (2003)","edition":"2"},{"key":"20_CR2","unstructured":"Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W.: Dismantling MIFARE Classic (forthcoming)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J.-H. Hoepman","year":"2006","unstructured":"Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 152\u2013167. Springer, Heidelberg (2006)"},{"key":"20_CR4","unstructured":"ISO\/IEC 14443. Identification cards - Contactless integrated circuit(s) cards - Proximity cards (2001)"},{"key":"20_CR5","unstructured":"Nohl, S.K., Evans, D., Pl\u00f6tz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIX Security Symposium, San Jose, CA, 31 July (2008)"},{"key":"20_CR6","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires, IX, pp. 5\u201338, January 1983, and pp. 161\u2013191, February 1983(1983)"},{"key":"20_CR7","unstructured":"Nohl, K., Pl\u00f6tz, H.: MIFARE, Little Security, Despite Obscurity. In: Presentation on the 24th Congress of the Chaos Computer Club in Berlin (December 2007)"},{"key":"20_CR8","unstructured":"NXP Semiconductors. MIFARE Standard 4KByte Card IC functional specification (February 2007)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T23:16:37Z","timestamp":1551568597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}