{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:36:03Z","timestamp":1725568563142},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_17","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:56:19Z","timestamp":1288691779000},"page":"203-219","source":"Crossref","is-referenced-by-count":4,"title":["Towards a Practical Solution to the RFID Desynchronization Problem"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"de Koning Gans","sequence":"first","affiliation":[]},{"given":"Flavio D.","family":"Garcia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, pp. 110\u2013114 (2005)","DOI":"10.1109\/PERCOMW.2005.12"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1108\/13598540710759763","volume":"12","author":"M. Attaran","year":"2007","unstructured":"Attaran, M.: RFID: an enabler of supply chain operations. Supply Chain Management: An International Journal\u00a012(4), 249\u2013257 (2007)","journal-title":"Supply Chain Management: An International Journal"},{"key":"17_CR3","unstructured":"Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1653662.1653669","volume-title":"Proceedings of the 16th ACM conference on Computer and communications security,CCS 2009","author":"C. Berbain","year":"2009","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: Proceedings of the 16th ACM conference on Computer and communications security,CCS 2009, pp. 43\u201353. ACM Press, New York (2009)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Brus\u00f3, M., Chatzikokolakis, K., den Hartog, J.: Formal verification of privacy for RFID systems. In: Proceedings of the 23nd IEEE Computer Security Foundations Symposium (2010)","DOI":"10.1109\/CSF.2010.13"},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1504\/IJACT.2008.021082","volume":"1","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Journal of Applied Cryptography\u00a01(2), 79\u201390 (2008)","journal-title":"Journal of Applied Cryptography"},{"key":"17_CR7","unstructured":"Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: Conference on RFID Security (2008)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 59\u201366 (2005)","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-12510-2_14","volume-title":"Smart Card Research and Advanced Application","author":"F. Garcia","year":"2010","unstructured":"Garcia, F., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 194\u2013208. Springer, Heidelberg (2010)"},{"issue":"2","key":"17_CR10","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609963","volume":"13","author":"A. Juels","year":"2009","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Transactions on Information and System Security (TISSEC)\u00a013(1), 1\u201323 (2009)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/1030083.1030112","volume-title":"Proceedings of the 11th ACM conference on Computer and Communications Security","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 210\u2013219. ACM, New York (2004)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-04444-1_20","volume-title":"Computer Security \u2013 ESORICS 2009","author":"C.Y. Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, p. 321. Springer, Heidelberg (2009)"},{"key":"17_CR15","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, Citeseer, vol.\u00a082 (2003)"},{"key":"17_CR16","volume-title":"International Conference on Pervasive Computing and Communications, PerCom 2006","author":"G. Tsudik","year":"2006","unstructured":"Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: International Conference on Pervasive Computing and Communications, PerCom 2006, Pisa, Italy. IEEE Computer Society Press, Los Alamitos (March 2006)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"17_CR18","first-page":"33","volume":"8","author":"S.W. Wanga","year":"2007","unstructured":"Wanga, S.W., Chenb, W.H., Onga, C.S., Liuc, L., Chuangb, Y.W.: RFID applications in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. Hospitals\u00a08, 33 (2007)","journal-title":"Hospitals"},{"issue":"12","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1016\/j.technovation.2005.08.012","volume":"26","author":"N.C. Wu","year":"2006","unstructured":"Wu, N.C., Nystrom, M.A., Lin, T.R., Yu, H.C.: Challenges to global RFID adoption. Technovation\u00a026(12), 1317\u20131323 (2006)","journal-title":"Technovation"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:12:00Z","timestamp":1559769120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}