{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:17Z","timestamp":1725551957727},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_14","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T19:43:16Z","timestamp":1270842196000},"page":"194-208","source":"Crossref","is-referenced-by-count":15,"title":["Modeling Privacy for Off-Line RFID Systems"],"prefix":"10.1007","author":[{"given":"Flavio D.","family":"Garcia","sequence":"first","affiliation":[]},{"given":"Peter","family":"van Rossum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-642-10838-9_4","volume-title":"WISA 2009","author":"G. Avoine","year":"2009","unstructured":"Avoine, G., Lauradoux, C., Martin, T.: When Compromised Readers Meet RFID. In: Youm, H.Y., Jang, J. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 36\u201350. Springer, Heidelberg (2009)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/11507840_14","volume-title":"Financial Cryptography and Data Security","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 125\u2013140. Springer, Heidelberg (2005)"},{"unstructured":"Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)","key":"14_CR3"},{"key":"14_CR4","first-page":"342","volume-title":"International Conference on Pervasive Computing and Communications \u2013 PerCom 2007","author":"A. Juels","year":"2007","unstructured":"Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: International Conference on Pervasive Computing and Communications \u2013 PerCom 2007, New York City, New York, USA, pp. 342\u2013347. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"14_CR5","first-page":"55","volume-title":"Workshop on Privacy in the Electronic Society \u2013 WPES","author":"Y. Nohara","year":"2006","unstructured":"Nohara, Y., Inoue, S., Baba, K., Yasuura, H.: Quantitative Evaluation of Unlinkable ID Matching Schemes. In: Workshop on Privacy in the Electronic Society \u2013 WPES, Alexandria, Virginia, USA, pp. 55\u201360. ACM Press, New York (2006)"},{"key":"14_CR6","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201cPrivacy-Friendly\u201d Tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/978-3-540-77090-9_71","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"P. Peris-Lopez","year":"2007","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An efficient authentication protocol for rfid systems resistant to active attacks. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol.\u00a04809, pp. 781\u2013794. Springer, Heidelberg (2007)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","volume-title":"Fast Software Encryption","author":"A. Shamir","year":"2008","unstructured":"Shamir, A.: SQUASH - A New MAC With Provable Security Properties for Highly Constrained Devices Such as RFID Tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 144\u2013157. Springer, Heidelberg (2008)"},{"key":"14_CR9","volume-title":"International Conference on Pervasive Computing and Communications \u2013 PerCom 2006","author":"G. Tsudik","year":"2006","unstructured":"Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: International Conference on Pervasive Computing and Communications \u2013 PerCom 2006, Pisa, Italy. IEEE Computer Society Press, Los Alamitos (March 2006)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T08:38:28Z","timestamp":1552466308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}