{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:18:27Z","timestamp":1761895107549,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137075"},{"type":"electronic","value":"9783642137082"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13708-2_29","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T11:56:06Z","timestamp":1277294166000},"page":"493-510","source":"Crossref","is-referenced-by-count":11,"title":["On RFID Privacy with Mutual Authentication and Tag Corruption"],"prefix":"10.1007","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Atmel\u00a0Corporation: Innovative IDIC solutions (2007), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc4602.pdf"},{"key":"29_CR2","unstructured":"NXP Semiconductors: MIFARE smartcard ICs (September 2008), http:\/\/www.mifare.net\/products\/smartcardics\/"},{"key":"29_CR3","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. In: International Workshop on Privacy in Location-Based Applications, PiLBA (2008)"},{"key":"29_CR4","unstructured":"I.C.A. Organization: Machine Readable Travel Documents, Doc\u00a09303, Part\u00a01 Machine Readable Passports, 5th Edn. (2003)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","first-page":"50","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 50\u201359. Springer, Heidelberg (2004)"},{"issue":"2","key":"29_CR6","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication\u00a024(2), 381\u2013395 (2006)","journal-title":"Journal of Selected Areas in Communication"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-03511-1_6","volume-title":"Privacy in Location-Based Applications","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol.\u00a05599, pp. 127\u2013150. Springer, Heidelberg (2009)"},{"key":"29_CR8","unstructured":"Avoine, G.: Adversarial model for radio frequency identification. ePrint, Report 2005\/049 (2005)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW \u201907), pp. 342\u2013347. ACM Press, New York (2007)","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"29_CR10","first-page":"242","volume-title":"Proc. of ASIACCS","author":"M. Burmester","year":"2007","unstructured":"Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242\u2013252. ACM Press, New York (2007)"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1145\/1368310.1368352","volume-title":"Proc. of ASIACCS","author":"R.I. Paise","year":"2008","unstructured":"Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292\u2013299. ACM Press, New York (2008)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Deng, R.H., Li, Y., Yao, A.C., Yung, M., Zhao, Y.: A new framework for RFID privacy. ePrint, Report 2010\/059 (2010)","DOI":"10.1007\/978-3-642-15497-3_1"},{"key":"29_CR14","volume-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-85053-3_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"M. Hutter","year":"2008","unstructured":"Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 363\u2013379. Springer, Heidelberg (2008)"},{"key":"29_CR16","unstructured":"Kasper, T., Oswald, D., Paar, C.: New methods for cost-effective side-channel attacks on cryptographic RFIDs. In: Workshop on RFID Security, RFIDSec (2009)"},{"key":"29_CR17","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Semi-destructive privacy in DoS-enabled RFID systems. In: Workshop on RFID Security, RFIDSec (2009)"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/978-3-642-05434-1_9","volume-title":"ALGOSENSORS 2009","author":"P. D\u2019Arco","year":"2009","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFIDEnabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol.\u00a05804, pp. 76\u201387. Springer, Heidelberg (2009)"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-88313-5_17","volume-title":"Computer Security - ESORICS 2008","author":"C.Y. Ng","year":"2008","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 251\u2013266. Springer, Heidelberg (2008)"},{"key":"29_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-04444-1_20","volume-title":"Computer Security \u2013 ESORICS 2009","author":"C.Y. Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 321\u2013336. Springer, Heidelberg (2009)"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS \u201909, pp. 195\u2013205. ACM Press, New York (2009)","DOI":"10.1145\/1533057.1533086"},{"key":"29_CR22","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Efficient RFID security and privacy with anonymizers. In: Workshop on RFID Security, RFIDSec (2009)"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/978-3-642-10433-6_10","volume-title":"International Conference in Cryptography and Network Security","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Miyaji, A., Echizen, I., Okamoto, T. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 134\u2013153. Springer, Heidelberg (2009)"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game\u2014A Completeness Theorem for Protocols with Honest Majority. In: Proc. of ACMSTOC, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"issue":"6","key":"29_CR25","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof-Systems. SIAM J. on Computing 18(6), 186\u2013208 (1989)","journal-title":"SIAM J. on Computing"},{"key":"29_CR26","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Workshop on Secure Component and System Identification (SECSI) (2010)"},{"key":"29_CR27","unstructured":"Kirschenbaum, I., Wool, A.: How to build a low-cost, extended-range RFID skimmer. ePrint, Report 2006\/054 (2006)"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, T.: When compromised readers meet RFID. In: Workshop on RFID Security (RFIDSec) (2009)","DOI":"10.1007\/978-3-642-10838-9_4"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Workshop on RFID Security (RFIDSec) (2009)","DOI":"10.1007\/978-3-642-12510-2_14"},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009\/465 (2009)","DOI":"10.1007\/978-3-642-15497-3_2"},{"key":"29_CR31","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: On rfid privacy with mutual authentication and tag corruption \u2014 Extended Version. ePrint (2010)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13708-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T01:05:16Z","timestamp":1635555916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13708-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137075","9783642137082"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13708-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}