{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:51Z","timestamp":1767340131330},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106279"},{"type":"electronic","value":"9783642106286"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10628-6_19","type":"book-chapter","created":{"date-parts":[[2009,12,4]],"date-time":"2009-12-04T01:41:25Z","timestamp":1259890885000},"page":"272-289","source":"Crossref","is-referenced-by-count":9,"title":["Private Interrogation of Devices via Identification Codes"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"G\u00e9rard","family":"Cohen","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Kindarji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/18.42172","volume":"35","author":"R. Ahlswede","year":"1989","unstructured":"Ahlswede, R., Dueck, G.: Identification via channels. IEEE Transactions on Information Theory\u00a035(1), 15\u201329 (1989)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"19_CR2","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1137\/S0097539796297577","volume":"28","author":"S. Ar","year":"1998","unstructured":"Ar, S., Lipton, R.J., Rubinfeld, R., Sudan, M.: Reconstructing algebraic functions from mixed data. SIAM J. Comput.\u00a028(2), 487\u2013510 (1998)","journal-title":"SIAM J. Comput."},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-85855-3_6","volume-title":"Security and Cryptography for Networks","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol.\u00a05229, pp. 77\u201391. Springer, Heidelberg (2008)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient Zero-Knowledge Identification Schemes which respect Privacy. In: ACM Symposium on Information, Computer and Communication Security \u2013 ASIACCS 2009, Sydney, Australia (March 2009)","DOI":"10.1145\/1533057.1533086"},{"key":"19_CR5","unstructured":"Arco, P.D., Scafuro, A., Visconti, I.: Semi-destructive privacy in RFID systems. In: Workshop on RFID Security (2009)"},{"key":"19_CR6","unstructured":"Eswaran, K.: Identification via channels and constant-weight codes, \n                    \n                      http:\/\/www.eecs.berkeley.edu\/~ananth\/229BSpr05\/Reports\/KrishEswaran.pdf"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Fung, B., Al-Hussaeni, K., Cao, M.: Preserving RFID Data Privacy. In: IEEE International Conference on RFID \u2013 RFID 2009, Orlando, Florida, USA (April 2009)","DOI":"10.1109\/RFID.2009.4911184"},{"key":"19_CR8","unstructured":"Information\u00a0Security Group. RFID security & privacy lounge, \n                    \n                      http:\/\/www.avoine.net\/rfid\/"},{"key":"19_CR9","unstructured":"Guruswami, V., Sudan, M.: Reflections on improved decoding of reed-solomon andalgebraic-geometric codes (2002)"},{"issue":"6","key":"19_CR10","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of reed-solomon and algebraic-geometry codes. IEEE Transactions on Information Theory\u00a045(6), 1757\u20131767 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR11","first-page":"342","volume-title":"PERCOMW","author":"A. Juels","year":"2007","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: PERCOMW, pp. 342\u2013347. IEEE Computer Society, Los Alamitos (2007)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-45537-X_10","volume-title":"Selected Areas in Cryptography","author":"A. Kiayias","year":"2001","unstructured":"Kiayias, A., Yung, M.: Polynomial reconstruction based cryptography. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 129\u2013133. Springer, Heidelberg (2001)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-45465-9_21","volume-title":"Automata, Languages and Programming","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Cryptographic hardness based on the decoding of reed-solomon codes. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol.\u00a02380, pp. 232\u2013243. Springer, Heidelberg (2002)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: Cryptographic hardness based on the decoding of reed-solomon codes with applications. In: Electronic Colloquium on Computational Complexity (ECCC), vol.\u00a0017 (2002)","DOI":"10.1007\/3-540-45465-9_21"},{"issue":"6","key":"19_CR15","doi-asserted-by":"publisher","first-page":"2752","DOI":"10.1109\/TIT.2008.921876","volume":"54","author":"A. Kiayias","year":"2008","unstructured":"Kiayias, A., Yung, M.: Cryptographic hardness based on the decoding of reed-solomon codes. IEEE Transactions on Information Theory\u00a054(6), 2752\u20132769 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"19_CR16","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/18.782144","volume":"45","author":"K. Kurosawa","year":"1999","unstructured":"Kurosawa, K., Yoshida, T.: Strongly universal hashing and identification codes via channels. IEEE Transactions on Information Theory\u00a045(6), 2091\u20132095 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/1030083.1030112","volume-title":"CCS","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: CCS, pp. 210\u2013219. ACM, New York (2004)"},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"60721","DOI":"10.1117\/12.644642","volume-title":"SPIE","author":"P. Moulin","year":"2006","unstructured":"Moulin, P., Koetter, R.: A framework for the design of good watermark identification codes. In: Delp III, E.J., Wong, P.W. (eds.) SPIE, vol.\u00a06072, p. 60721H. SPIE, San Jose (2006)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-88313-5_17","volume-title":"Computer Security - ESORICS 2008","author":"C.Y. Ng","year":"2008","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., L\u00f3pez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 251\u2013266. Springer, Heidelberg (2008)"},{"issue":"9","key":"19_CR20","first-page":"66","volume":"48","author":"M. Ohkubo","year":"2005","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID privacy issues and technical challenges\u00a048(9), 66\u201371 (2005)","journal-title":"RFID privacy issues and technical challenges"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-68914-0_29","volume-title":"Applied Cryptography and Network Security","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Phan, R.C.-W.: Traceable Privacy of Recent Provably-Secure RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 479\u2013489. Springer, Heidelberg (2008)"},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1145\/1368310.1368352","volume-title":"ASIACCS","author":"R.-I. Paise","year":"2008","unstructured":"Paise, R.-I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Abe, M., Gligor, V.D. (eds.) ASIACCS, pp. 292\u2013299. ACM, New York (2008)"},{"key":"19_CR23","unstructured":"PEARS. Privacy Ensuring Affordable RFID System. European Project"},{"key":"19_CR24","unstructured":"Rieback, M.R.: Security and Privacy of Radio Frequency Identification. PhD thesis, Vrije Universiteit, Amsterdam, The Netherlands (2008)"},{"key":"19_CR25","unstructured":"Rudra, A.: List Decoding and Property Testing of Error Correcting Codes. PhD thesis, University of Washington (2007)"},{"key":"19_CR26","unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: User Privacy in Transport Systems Based on RFID E-Tickets. In: Workshop on Privacy in Location-Based Applications \u2013 PILBA 2008, Malaga, Spain (October 2008)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Evdokimov, S.: Privacy Enhancing Technologies for RFID - A Critical Investigation of State of the Art Research. In: IEEE Privacy and Security (2009)","DOI":"10.1109\/MSP.2009.31"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"issue":"1","key":"19_CR29","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/18.179339","volume":"39","author":"S. Verdu","year":"1993","unstructured":"Verdu, S., Wei, V.K.: Explicit construction of optimal constant-weight codes for identification via channels. IEEE Transactions on Information Theory\u00a039(1), 30\u201336 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10628-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:57:18Z","timestamp":1558270638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10628-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106279","9783642106286"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10628-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}