{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:10:50Z","timestamp":1739509850736,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_7","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T07:37:49Z","timestamp":1258097869000},"page":"71-85","source":"Crossref","is-referenced-by-count":0,"title":["On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup"],"prefix":"10.1007","author":[{"given":"Bing","family":"Liang","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changshe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops, pp. 110\u2013114 (2005)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1145\/1368310.1368351","volume-title":"ASIACCS 2008: Proceedings of the 2008 ACM symposium on Information, computer and communications security","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Robust, anonymous RFID authentication with constant key-lookup. In: ASIACCS 2008: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pp. 283\u2013291. ACM, New York (2008)"},{"key":"7_CR3","unstructured":"Chatmon, C., van Le, T., Burmester, M.: Secure anonymous RFID authentication protocols. Technical Report TR-060112 (2006)"},{"key":"7_CR4","volume-title":"Conference on Computer and Communications Security \u2013 ACM CCS","author":"A. Czeskis","year":"2008","unstructured":"Czeskis, A., Koscher, K.: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: Conference on Computer and Communications Security \u2013 ACM CCS, October 2008. ACM Press, New York (2008)"},{"key":"7_CR5","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm, Athens, Greece, September 2005. IEEE, Los Alamitos (2005)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: IEEE International Conference on Pervasive Computing and Communications, pp. 269\u2013275 (2006)","DOI":"10.1109\/PERCOM.2006.5"},{"issue":"4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM\u00a033(4), 792\u2013807 (1986)","journal-title":"J. ACM"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR9","unstructured":"Juels, A., Pappu, R., Parno, B.: Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. In: 17th USENIX Security Symposium, San Jose, CA, USA, July 2008, pp. 75\u201390. USENIX (2008)"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/ICPADS.2008.46","volume-title":"ICPADS 2008: Proceedings of the 2008 14th IEEE International Conference on Parallel and Distributed Systems","author":"T.-L. Lim","year":"2008","unstructured":"Lim, T.-L., Li, T., Gu, T.: Secure rfid identification and authentication with triggered hash chain variants. In: ICPADS 2008: Proceedings of the 2008 14th IEEE International Conference on Parallel and Distributed Systems, Washington, DC, USA, pp. 583\u2013590. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 276\u2013290. Springer, Heidelberg (2006)"},{"key":"7_CR12","first-page":"210","volume-title":"Conference on Computer and Communications Security \u2013 ACM CCS","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security \u2013 ACM CCS, Washington, DC, USA, October 2004, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"7_CR13","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201cPrivacy-Friendly\u201d Tags. In: RFID Privacy Workshop, November 2003. MIT, MA (2003)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information Security and Privacy","author":"M. Rieback","year":"2005","unstructured":"Rieback, M., Crispo, B., Tanenbaum, A.: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 184\u2013194. Springer, Heidelberg (2005)"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2006.17","volume":"5","author":"M. Rieback","year":"2006","unstructured":"Rieback, M., Crispo, B., Tanenbaum, A.: The Evolution of RFID Security. IEEE Pervasive Computing\u00a05(1), 62\u201369 (2006)","journal-title":"IEEE Pervasive Computing"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MPRV.2008.22","volume":"7","author":"P. Rotter","year":"2008","unstructured":"Rotter, P.: A Framework for Assessing RFID System Security and Privacy Risks. IEEE Pervasive Computing\u00a07(2), 70\u201377 (2008)","journal-title":"IEEE Pervasive Computing"},{"key":"7_CR17","volume-title":"International Conference on Pervasive Computing and Communications \u2013 PerCom 2006","author":"G. Tsudik","year":"2006","unstructured":"Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: International Conference on Pervasive Computing and Communications \u2013 PerCom 2006, Pisa, Italy, March 2006. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","first-page":"454","volume-title":"Security in Pervasive Computing","author":"S. Weis","year":"2004","unstructured":"Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 454\u2013469. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T06:15:56Z","timestamp":1739427356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}