{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:55:06Z","timestamp":1725530106577},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008429"},{"type":"electronic","value":"9783642008436"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_32","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T14:42:08Z","timestamp":1238596928000},"page":"372-383","source":"Crossref","is-referenced-by-count":2,"title":["Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems"],"prefix":"10.1007","author":[{"given":"Shaoying","family":"Cai","sequence":"first","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"EPCglobal Inc., E.P.C. Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.1.0. EPCglobal Standards (October 2007)"},{"key":"32_CR2","unstructured":"EPCglobal Inc., Architecture Framework Standard v1.0"},{"key":"32_CR3","unstructured":"Liu, E., Kumar, A.: Leveraging information sharing to increase supply chain configurability. In: Twenty-Fourth International Conference on Information Systems, pp. 523\u2013537 (2003)"},{"issue":"2","key":"32_CR4","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"32_CR6","volume-title":"IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing \u2013 SecPerU 2006","author":"J. Bringer","year":"2006","unstructured":"Bringer, J., Chabanne, H., Emmanuelle, D.: HB\u2009+\u2009+\u2009: a Lightweight Authentication Protocol Secure against Some Attacks. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing \u2013 SecPerU 2006, Lyon, France. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Sarma","year":"2003","unstructured":"Sarma, S., Weis, S., Engels, D.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"32_CR8","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proc. of RFID Privacy Workshop (2003)"},{"key":"32_CR9","unstructured":"Aigner, M., Feldhofer, M.: Secure Symmetric Authentication for RFID Tags. Telecommunication and Mobile Computing (March 2005)"},{"key":"32_CR10","unstructured":"Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP 2003 (2003)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Proc. of 2nd Workshop on RFID Security (July 2006)","DOI":"10.1007\/11833529_93"},{"key":"32_CR12","first-page":"234","volume-title":"ASIACCS 2007: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security","author":"Y. Li","year":"2007","unstructured":"Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS 2007: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 234\u2013241. ACM, Singapore (2007)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to rfid security. In: 17th USENIX Security Symposium, pp. 75\u201390 (2008)","DOI":"10.1145\/1352533.1352534"},{"key":"32_CR14","unstructured":"Song, B.: RFID Tag Ownership Transfer. In: Conference on RFID Security (RFIDsec 2008), Budapest, Hungary (July 2008)"},{"key":"32_CR15","unstructured":"van Deursen, T., Radomirovic, S.: Attacks on RFID Protocols. Cryptology ePrint Archive: Report 2008\/310 (2008)"},{"issue":"03","key":"32_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MIC.2003.1200305","volume":"7","author":"D. Menasc\u00e9","year":"2003","unstructured":"Menasc\u00e9, D.: Security performance. IEEE Internet Computing\u00a07(03), 84\u201387 (2003)","journal-title":"IEEE Internet Computing"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/351827.384245","volume":"5","author":"X. Li","year":"2000","unstructured":"Li, X., Zhang, X., Kubricht, S.: Improving memory performance of sorting algorithms. J. Exp. Algorithmics\u00a05, 3 (2000)","journal-title":"J. Exp. Algorithmics"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T18:22:39Z","timestamp":1684952559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}