{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:35:48Z","timestamp":1725568548005},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_7","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"66-74","source":"Crossref","is-referenced-by-count":15,"title":["On the Claimed Privacy of EC-RAC III"],"prefix":"10.1007","author":[{"given":"Junfeng","family":"Fan","sequence":"first","affiliation":[]},{"given":"Jens","family":"Hermans","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 149\u2013161. Springer, Heidelberg (2008)"},{"key":"7_CR2","volume-title":"Proceedings of the 3rd ACM conference on Wireless network security (WiSec 2010)","author":"Y.K. Lee","year":"2010","unstructured":"Lee, Y.K., Batina, L., Singel\u00e9e, D., Verbauwhede, I.: Low-Cost Untraceable Authentication Protocols for RFID. In: Proceedings of the 3rd ACM conference on Wireless network security (WiSec 2010), Hoboken, NJ, USA, ACM Press, New York (2010)"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/RFID.2008.4519370","volume-title":"IEEE International Conference on RFID 2008","author":"Y.K. Lee","year":"2008","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In: IEEE International Conference on RFID 2008, Las Vegas, NA, USA, pp. 97\u2013104. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"7_CR4","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/RFID.2009.4911179","volume-title":"IEEE International Conference on RFID 2009","author":"Y.K. Lee","year":"2009","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. In: IEEE International Conference on RFID 2009, Orlando, FL, USA, pp. 178\u2013185. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 31\u201353. Springer, Heidelberg (1993)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"7_CR7","unstructured":"van Deursen, T., Radomirovic, S.: Attacks on RFID protocols. Cryptology ePrint Archive, Report 2008\/310 (2008), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"7_CR8","unstructured":"van Deursen, T., Radomirovic, S.: Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive, Report 2009\/332 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:31:48Z","timestamp":1619785908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}