{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:35:48Z","timestamp":1725568548558},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_8","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"75-90","source":"Crossref","is-referenced-by-count":10,"title":["EC-RAC: Enriching a Capacious RFID Attack Collection"],"prefix":"10.1007","author":[{"given":"Ton","family":"van Deursen","sequence":"first","affiliation":[]},{"given":"Sa\u0161a","family":"Radomirovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"van Deursen, T., Radomirovi\u0107, S.: Attacks on RFID protocols (version 1.1). Cryptology ePrint Archive, Report 2008\/310 (August 2009), http:\/\/eprint.iacr.org\/2008\/310"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/32.481514","volume":"22","author":"N. Heintze","year":"1996","unstructured":"Heintze, N., Tygar, J.D.: A model for secure protocols and their compositions. IEEE Trans. Software Eng.\u00a022(1), 16\u201330 (1996)","journal-title":"IEEE Trans. Software Eng."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Protocol interactions and the chosen protocol attack. In: Security Protocols Workshop, pp. 91\u2013104 (1997)","DOI":"10.1007\/BFb0028162"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.ic.2007.07.002","volume":"206","author":"S. Andova","year":"2008","unstructured":"Andova, S., Cremers, C., Gj\u00f8steen, K., Mauw, S., Mj\u00f8lsnes, S., Radomirovi\u0107, S.: A framework for compositional verification of security protocols. Information and Computation\u00a0206, 425\u2013459 (2008)","journal-title":"Information and Computation"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/ARES.2006.63","volume-title":"Proc. of The First International Conference on Availability, Reliability and Security (ARES)","author":"C. Cremers","year":"2006","unstructured":"Cremers, C.: Feasibility of multi-protocol attacks. In: Proc. of The First International Conference on Availability, Reliability and Security (ARES), pp. 287\u2013294. IEEE Computer Society, Austria (April 2006)"},{"issue":"6","key":"8_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/S0020-0190(99)00023-X","volume":"69","author":"W.G. Tzeng","year":"1999","unstructured":"Tzeng, W.G., Hu, C.M.: Inter-protocol interleaving attacks on some authentication and key distribution protocols. Inf. Process. Lett.\u00a069(6), 297\u2013302 (1999)","journal-title":"Inf. Process. Lett."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Lee, Y., Batina, L., Verbauwhede, I.: Untraceable RFID authentication protocols: Revision of EC-RAC. In: IEEE International Conference on RFID \u2013 RFID 2009, Orlando, Florida, USA, pp. 178\u2013185 (April 2009)","DOI":"10.1145\/1741866.1741877"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In: Proceedings of the 2008 IEEE International Conference on RFID, pp. 97\u2013104 (2008)","DOI":"10.1109\/RFID.2008.4519370"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Singel\u00e9e, D., Verbauwhede, I.: Low-cost untraceable authentication protocols for RFID. In: 3rd ACM Conference on Wireless Network Security, WiSec 2010 (2010)","DOI":"10.1145\/1741866.1741877"},{"key":"8_CR11","volume-title":"The 2nd International Conference on Mobile Lightweight Wireless Systems, Mobilight 2010.","author":"Y.K. Lee","year":"2010","unstructured":"Lee, Y.K., Batina, L., Singel\u00e9e, D., Verbauwhede, I.: Wide-weak privacy-preserving RFID authentication protocols. In: The 2nd International Conference on Mobile Lightweight Wireless Systems, Mobilight 2010. Springer, Heidelberg (2010)"},{"key":"8_CR12","unstructured":"Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)"},{"key":"8_CR13","first-page":"342","volume-title":"International Conference on Pervasive Computing and Communications, PerCom 2007","author":"A. Juels","year":"2007","unstructured":"Juels, A., Weis, S.: Defining strong privacy for RFID. In: International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 342\u2013347. IEEE Computer Society Press, New York (March 2007)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79966-5_1","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"T. Deursen van","year":"2008","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-540-88313-5_18","volume-title":"Computer Security - ESORICS 2008","author":"J. Ha","year":"2008","unstructured":"Ha, J., Moon, S., Zhou, J., Ha, J.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 267\u2013281. Springer, Heidelberg (2008)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Ma, C., Li, Y., Deng, R.H., Li, T.: RFID privacy: relation between two notions, minimal condition, and efficient construction. In: ACM Conference on Computer and Communications Security, pp. 54\u201365 (2009)","DOI":"10.1145\/1653662.1653670"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-540-79263-5_20","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"I. Damg\u00e5rd","year":"2008","unstructured":"Damg\u00e5rd, I., Pedersen, M.\u00d8.: RFID security: Tradeoffs between security and efficiency. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 318\u2013332. Springer, Heidelberg (2008)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 149\u2013161. Springer, Heidelberg (2008)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-03944-7_4","volume-title":"Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks","author":"T. Deursen van","year":"2009","unstructured":"van Deursen, T., Radomirovi\u0107, S.: Algebraic attacks on RFID protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. LNCS, vol.\u00a05746, pp. 38\u201351. Springer, Heidelberg (2009)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Fan, J., Hermans, J., Vercauteren, F.: On the claimed privacy of EC-RAC III. Cryptology ePrint Archive, Report 2010\/132 (2010), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-16822-2_7"},{"key":"8_CR22","unstructured":"Song, B.: RFID Tag Ownership Transfer. In: Workshop on RFID Security, RFIDSec 2008, Budapest, Hungary (July 2008)"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1460877.1460921","volume-title":"Proc. 4th International Conference on Security and Privacy in Communication Networks","author":"T. Dimitriou","year":"2008","unstructured":"Dimitriou, T.: rfidDOT: RFID delegation and ownership transfer made simple. In: Proc. 4th International Conference on Security and Privacy in Communication Networks, pp. 1\u20138. ACM, New York (September 2008)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/978-3-642-04444-1_39","volume-title":"Computer Security \u2013 ESORICS 2009","author":"T. Deursen van","year":"2009","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S., Vullers, P.: Secure ownership and ownership transfer in RFID systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 637\u2013654. Springer, Heidelberg (2009)"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/CSFW.1997.596782","volume-title":"10th Computer Security Foundations Workshop (CSFW 1997)","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: 10th Computer Security Foundations Workshop (CSFW 1997), June 10-12, pp. 31\u201344. IEEE Computer Society, USA (1997)"},{"key":"8_CR26","unstructured":"Cremers, C.: Scyther - Semantics and Verification of Security Protocols. Ph.D. dissertation, Eindhoven University of Technology (2006)"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/CSFW.2001.930138","volume-title":"14th IEEE Computer Security Foundations Workshop (CSFW)","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 82\u201396. IEEE Computer Society, Los Alamitos (2001)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11863908_25","volume-title":"Computer Security \u2013 ESORICS 2006","author":"M. Backes","year":"2006","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Limits of the BRSIM\/UC soundness of Dolev-Yao models with hashes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 404\u2013423. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T23:42:42Z","timestamp":1636760562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}