{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:19:51Z","timestamp":1761895191449},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_14","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:56:19Z","timestamp":1288691779000},"page":"158-175","source":"Crossref","is-referenced-by-count":11,"title":["Anonymous Authentication for RFID Systems"],"prefix":"10.1007","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Atmel Corporation: Innovative IDIC solutions (2007), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc4602.pdf"},{"key":"14_CR2","unstructured":"NXP Semiconductors: MIFARE Smartcard ICs (September 2008), http:\/\/www.mifare.net\/products\/smartcardics\/"},{"key":"14_CR3","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain (October 9, 2008)"},{"key":"14_CR4","unstructured":"Organization, I.C.A.: Machine Readable Travel Documents, Doc 9303, Part 1 Machine Readable Passports, 5 (edn.) (2003)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 50\u201359. Springer, Heidelberg (2004)"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication\u00a024(2), 381\u2013395 (2006)","journal-title":"Journal of Selected Areas in Communication"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-03511-1_6","volume-title":"Privacy in Location-Based Applications","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol.\u00a05599, pp. 127\u2013150. Springer, Heidelberg (2009)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","first-page":"493","volume-title":"Proceedings of 8th International Conference on Applied Cryptography and Network Security (ACNS 2010)","author":"A.R. Sadeghi","year":"2010","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol.\u00a06123, pp. 493\u2013510. Springer, Heidelberg (2010)"},{"key":"14_CR9","unstructured":"Avoine, G.: RFID Lounge (April 2010), http:\/\/www.avoine.net\/rfid\/"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11957454_1","volume-title":"Privacy Enhancing Technologies","author":"T.S. Heydt-Benjamin","year":"2006","unstructured":"Heydt-Benjamin, T.S., Chae, H.J., Defend, B., Fu, K.: Privacy for Public Transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Blass, E.O., Kurmus, A., Molva, R., Strufe, T.: PSP: Private and secure payment with RFID. Cryptology ePrint Archive, Report 2009\/181 (2009)","DOI":"10.1145\/1655188.1655196"},{"key":"14_CR12","first-page":"600","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"P. Bichsel","year":"2009","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 600\u2013610. ACM Press, New York (2009)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, T.: When compromised readers meet RFID. In: RFIDSec 2009 (2009)","DOI":"10.1007\/978-3-642-10838-9_4"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: RFIDSec 2009 (2009)","DOI":"10.1007\/978-3-642-12510-2_14"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009\/465 (2009)","DOI":"10.1007\/978-3-642-15497-3_2"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 268\u2013289. Springer, Heidelberg (2003)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Chen, L., Morrissey, P., Smart, N.P.: DAA: Fixing the pairing based protocols. Cryptology ePrint Archive, Report 2009\/198 (2009)","DOI":"10.1109\/CINC.2009.116"},{"key":"14_CR19","unstructured":"Spirtech: CALYPSO functional specification: Card application, version 1.3. (October 2005), http:\/\/calypso.spirtech.net\/"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"P. Golle","year":"2004","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 163\u2013178. Springer, Heidelberg (2004)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/978-3-540-30121-9_84","volume-title":"Embedded and Ubiquitous Computing","author":"J. Saito","year":"2004","unstructured":"Saito, J., Ryou, J.C., Sakurai, K.: Enhancing privacy of universal re-encryption scheme for RFID tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol.\u00a03207, pp. 879\u2013890. Springer, Heidelberg (2004)"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1102120.1102134","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 92\u2013101. ACM Press, New York (2005)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-10433-6_10","volume-title":"Cryptology and Network Security","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 134\u2013153. Springer, Heidelberg (2009)"},{"key":"14_CR25","unstructured":"Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005\/049 (2005)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006\/137 (2006)","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Burmester, M., Le, T.V., Medeiros, B.D., Tsudik, G.: Universally composable RFID identification and authentication protocols. ACM Transactions on Information and System Security (TISSEC)\u00a012(4) (2009)","DOI":"10.1145\/1513601.1513603"},{"key":"14_CR29","unstructured":"Liu, J.K., Baek, J., Zhou, J., Yang, Y., Wong, J.W.: Efficient online\/offline identity-based signature for wireless sensor network. Cryptology ePrint Archive, Report 2010\/003 (2010)"},{"key":"14_CR30","unstructured":"Atmel Corporation: Secure RFID: CryptoRF (July 2009), http:\/\/www.atmel.com\/products\/SecureRF"},{"key":"14_CR31","unstructured":"NXP Semiconductors: MiFare SmartMX (July 2009), http:\/\/www.mifare.net\/products\/smartcardics\/smartmx.asp"},{"key":"14_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/PERCOM.2007.26","volume-title":"Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications","author":"L. Bolotnyy","year":"2007","unstructured":"Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in RFID systems. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, pp. 211\u2013220. IEEE Computer Society, Los Alamitos (2007)"},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/RFID.2008.4519377","volume-title":"IEEE International Conference on RFID 2008","author":"S. Devadas","year":"2008","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: IEEE International Conference on RFID 2008, Las Vegas, NV, USA, April 16\u201317, pp. 58\u201364. IEEE Computer Society, Los Alamitos (2008)"},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"14_CR36","unstructured":"Smart, N.: D.SPA.7 ECRYPT2 yearly report on algorithms and keysizes (2008-2009), http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.7.pdf (August 2008)"},{"key":"14_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-12510-2_16","volume-title":"Smart Card Research and Advanced Application","author":"L. Chen","year":"2010","unstructured":"Chen, L., Page, D., Smart, N.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 223\u2013237. Springer, Heidelberg (2010)"},{"key":"14_CR38","volume-title":"Proceedings of the 38th Symposium on Foundations of Computer Science","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogawayy, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T18:42:48Z","timestamp":1636742568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}