{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:35:52Z","timestamp":1725568552063},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_12","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:56:19Z","timestamp":1288691779000},"page":"124-137","source":"Crossref","is-referenced-by-count":13,"title":["Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[]},{"given":"Nina","family":"Oertel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Applebaum, B., Freedman, M., Ringberg, H., Caesar, M., Rexford J.: Collaborative, Privacy-Preserving Data Aggregation At Scale (2009), http:\/\/eprint.iacr.org\/2009\/180.pdf","DOI":"10.1007\/978-3-642-14527-8_4"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceesings of the 15th ACM Conference on Computer and Communications Security, CCS (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th annual ACM symposium on Theory of computing (1988)","DOI":"10.1145\/62212.62213"},{"key":"12_CR4","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Security through Private Information Aggregation (2009), http:\/\/arxiv1.library.cornell.edu\/abs\/0903.4258"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.: Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In: Proceedings of the Workshop on New Security Paradigms (2001)","DOI":"10.1145\/508171.508174"},{"key":"12_CR6","unstructured":"European Commission. Report on Community Customs Activities on Counterfeit and Piracy (2008)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Applied Mathematics\u00a039(3) (1992)","DOI":"10.1016\/0166-218X(92)90177-C"},{"key":"12_CR8","unstructured":"Goldreich, O.: Secure Multi-party Computation (2002), www.wisdom.weizmann.ac.il\/~oded\/pp.html"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing (1987)","DOI":"10.1145\/28395.28420"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Proceedings of the 5th Theory of Cryptography Conference (2008)","DOI":"10.1007\/978-3-540-78524-8_10"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Practical Privacy-Preserving Benchmarking. In: Proceedings of the 23rd IFIP International Information Security Conference (2008)","DOI":"10.1007\/978-0-387-09699-5_2"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Dahlmeier, D., Schr\u00f6pfer, A., Biswas, D.: On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. In: Proceedings of the 24th ACM Symposium on Applied Computing (2009)","DOI":"10.1145\/1529282.1529730"},{"key":"12_CR13","unstructured":"Kuerschner, C., Thiesse, F., Fleisch, E.: An analysis of data-on-tag concepts in manufacturing. In: Proceedings of the 3rd Konferenz Ubiquit\u00e4re und Mobile Informationssysteme (2008)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Lee, A., Tabriz, P., Borisov, N.: A Privacy-Preserving Interdomain Audit Framework. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (2006)","DOI":"10.1145\/1179601.1179620"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In: Proceedings of the IEEE RFID Conference (2009)","DOI":"10.1109\/RFID.2009.4911190"},{"key":"12_CR16","unstructured":"Lincoln, P., Porras, P., Shmatikov, V.: Privacy-Preserving Sharing and Correlation of Security Alerts. In: Proceedings of the USENIX Security Symposium (2004)"},{"key":"12_CR17","unstructured":"Locasto, M., Parekh, J., Keromytis, A., Stolfo, S.: Towards Collaborative Security and P2P Intrusion Detection. In: Proceedings of the Information Assurance Workshop (2005)"},{"key":"12_CR18","unstructured":"Mirowski, L., Hartnett, J.: Deckard: A System to Detect Change of RFID Tag Ownership. International Journal of Computer Science and Network Security\u00a07(7) (2007)"},{"key":"12_CR19","unstructured":"Oertel, N.: Tracking based product authentication: Catching intruders in the supply chain. In: Proceedings of the 17th European Conference on Information Systems (2008)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Parekh, J., Wang, K., Stolfo, S.: Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection. In: Proceedings of the SIGCOMM Workshop on Large-Scale Attack Defense (2006)","DOI":"10.1145\/1162666.1162667"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Porras, P., Shmatikov, V.: Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges. In: Proceedings of the Workshop on New Security Paradigms (2006)","DOI":"10.1145\/1278940.1278949"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Santos, B., Smith, L.: RFID in the Supply Chain: Panacea or Pandora\u2019s Box? Communications of the ACM\u00a051(10) (2008)","DOI":"10.1145\/1400181.1400209"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Sarma, S., Brock, D., Engels, D.: Radio frequency identification and the electronic product code. IEEE Micro.\u00a021(6) (2001)","DOI":"10.1109\/40.977758"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network \u2013 The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 20th ACM Symposium on Applied Computing (2005)","DOI":"10.1145\/1066677.1067041"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Yao, A.: Protocols for Secure Computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving Clone Detection for RFID-enabled Supply Chains. In: Proceedings of the IEEE International Conference on RFID (2010)","DOI":"10.1109\/RFID.2010.5467257"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T22:52:24Z","timestamp":1685832744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}