{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:45:39Z","timestamp":1743140739700,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111440"},{"type":"electronic","value":"9783642111457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11145-7_13","type":"book-chapter","created":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T08:23:04Z","timestamp":1263370984000},"page":"150-164","source":"Crossref","is-referenced-by-count":11,"title":["Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains"],"prefix":"10.1007","author":[{"given":"Shaoying","family":"Cai","sequence":"first","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changshe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Cai, S., Li, T., Ma, C., Li, Y., Deng, R.: Enabling secure secret updating for unidirectional key distribution in rfid-enabled supply chains, http:\/\/icsd.i2r.a-star.edu.sg\/staff\/tieyan\/SecureRFID\/docs\/ICICS09-full.pdf"},{"key":"13_CR2","unstructured":"EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, version 1.2.0. (October 2008)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-540-30496-8_5","volume-title":"Security in Ad-hoc and Sensor Networks","author":"K. Fishkin","year":"2005","unstructured":"Fishkin, K., Roy, S., Jiang, B.: Some Methods for Privacy in RFID Communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 42\u201353. Springer, Heidelberg (2005)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to rfid security. In: 17th USENIX Security Symposium, pp. 75\u201390 (2008)","DOI":"10.1145\/1352533.1352534"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Conference on Computer and Communications Security \u2013 ACM CCS 2003, October 2003, pp. 103\u2013111 (2003)","DOI":"10.1145\/948125.948126"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Moskowitz, P.: Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced. In: Workshop on Privacy in the Electronic Society \u2013 WPES 2005 (November 2005)","DOI":"10.1145\/1102199.1102205"},{"issue":"2","key":"13_CR8","first-page":"115","volume":"1","author":"M. Langheinrich","year":"2007","unstructured":"Langheinrich, M., Marti, R.: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Special Issue on RFID Technology\u00a01(2), 115\u2013128 (2007)","journal-title":"IEEE Systems Journal, Special Issue on RFID Technology"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-76772-5_1","volume-title":"Ubiquitous Computing Systems","author":"M. Langheinrich","year":"2007","unstructured":"Langheinrich, M., Marti, R.: Rfid privacy using spatially distributed shared secrets. In: Ichikawa, H., Cho, W.-D., Satoh, I., Youn, H.Y. (eds.) UCS 2007. LNCS, vol.\u00a04836, pp. 1\u201316. Springer, Heidelberg (2007)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ASIACCS 2007, Singapore, pp. 234\u2013241 (2007)","DOI":"10.1145\/1229285.1229318"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Conference on Computer and Communications Security \u2013 ACM CCS 2004, October 2004, pp. 210\u2013219 (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"13_CR12","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: International Conference on Ubiquitous Computing \u2013 Ubicomp 2004 (September 2004)"},{"key":"13_CR13","first-page":"300","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal SIAM\u00a08, 300\u2013304 (1960)","journal-title":"Journal SIAM"},{"issue":"11","key":"13_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11145-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T14:17:05Z","timestamp":1685369825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11145-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111440","9783642111457"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11145-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}