{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T05:33:44Z","timestamp":1740461624469,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_27","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"350-357","source":"Crossref","is-referenced-by-count":3,"title":["A Secure RFID Ticket System for Public Transport"],"prefix":"10.1007","author":[{"given":"Kun","family":"Peng","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A lightweight rfid protocol to protect against traceability and cloning attacks. In: ICSPEACN 2005, pp. 59\u201366 (2005)","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-45472-1_7","volume-title":"Financial Cryptography","author":"P. Fouque","year":"2001","unstructured":"Fouque, P., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 90\u2013104. Springer, Heidelberg (2001)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Ateniese, G., de Medeiros, B.: Untraceable rfid tags via insubvertible encryption. In: ACM CCS 2005, pp. 92\u2013101 (2005)","DOI":"10.1145\/1102120.1102134"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE CPCC 2004, pp. 149\u2013153 (2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing euros: Privacy protection in rfidenabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935308_1","volume-title":"Information and Communications Security","author":"C. Lim","year":"2006","unstructured":"Lim, C., Kwon, T.: Strong and robust rfid authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"27_CR7","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library rfid: Issues, practices, and architectures. In: ACM CCS 2006, pp. 210\u2013219 (2006)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.: Rfid authentication protocol for low-cost tags. In: ACM CWNS 2008, pp. 140\u2013147 (2008)","DOI":"10.1145\/1352533.1352556"},{"key":"27_CR9","unstructured":"Rivest, R., Weis, S., Sarma, S., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: ICSPC 2003, pp. 50\u201359 (2003)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Tsudik, G.: Ya-trap: Yet another trivial rfid authentication protocol. In: IEEE PCCW 2006, pp. 640\u2013643 (2006)","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"27_CR11","unstructured":"Sadeghi, A., Visconti, I., Wachsmann, C.: User privacy in transport systems based on rfid e-tickets. In: PILBA 2008 (2008)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T23:58:46Z","timestamp":1740441526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}