{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:00:14Z","timestamp":1761807614525},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176968"},{"type":"electronic","value":"9783642176975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17697-5_3","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T07:22:58Z","timestamp":1291706578000},"page":"39-63","source":"Crossref","is-referenced-by-count":14,"title":["Impossibility Results for RFID Privacy Notions"],"prefix":"10.1007","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Scafuro","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/978-3-642-13708-2_29","volume-title":"Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010)","author":"F. Armknecht","year":"2010","unstructured":"Armknecht, F., Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol.\u00a06123, pp. 493\u2013510. Springer, Heidelberg (2010)"},{"key":"3_CR2","unstructured":"Atmel\u00a0Corporation: Innovative IDIC solutions (2007), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc4602.pdf"},{"key":"3_CR3","unstructured":"Avoine, G.: Adversarial model for radio frequency identification. ePrint, Report 2005\/049 (2005)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Avoine, G., Lauradoux, C., Martin, T.: When compromised readers meet RFID. In: The 5th Workshop on RFID Security (RFIDSec) (2009)","DOI":"10.1007\/978-3-642-10838-9_4"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-44987-6_30","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification protocols secure against reset attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 495\u2013511. Springer, Heidelberg (2001)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-88313-5_24","volume-title":"Computer Security - ESORICS 2008","author":"C. Blundo","year":"2008","unstructured":"Blundo, C., Persiano, G., Sadeghi, A.R., Visconti, I.: Improved security notions and protocols for non-transferable identification. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 364\u2013378. Springer, Heidelberg (2008)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/1533057.1533086","volume-title":"Proceedings of ASIACCS 2009","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS 2009, pp. 195\u2013205. ACM Press, New York (2009)"},{"key":"3_CR8","first-page":"242","volume-title":"Proc. of ASIACCS","author":"M. Burmester","year":"2007","unstructured":"Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242\u2013252. ACM Press, New York (2007)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235\u2013244 (2000)","DOI":"10.1145\/335305.335334"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-05434-1_9","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"P. D\u2019Arco","year":"2009","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol.\u00a05804, pp. 76\u201387. Springer, Heidelberg (2009)"},{"key":"3_CR11","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Semi-destructive privacy in DoS-enabled RFID systems. In: The 5th Workshop on RFID Security (RFIDSec) (2009)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Deng, R.H., Li, Y., Yao, A.C., Yung, M., Zhao, Y.: A new framework for RFID privacy. ePrint, Report 2010\/059 (2010)","DOI":"10.1007\/978-3-642-15497-3_1"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-72540-4_9","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"Y. Deng","year":"2007","unstructured":"Deng, Y., Lin, D.: Instance-dependent verifiable random functions and their application to simultaneous resettability. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 148\u2013168. Springer, Heidelberg (2007)"},{"key":"3_CR14","unstructured":"EPCglobal Inc.: (April 2008), http:\/\/www.epcglobalinc.org\/"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-88313-5_7","volume-title":"Computer Security - ESORICS 2008","author":"F. Garcia","year":"2008","unstructured":"Garcia, F., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Wichers Schreur, R., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 97\u2013114. Springer, Heidelberg (2008)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: The 5th Workshop on RFID Security (RFIDSec) (2009)","DOI":"10.1007\/978-3-642-12510-2_14"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Goyal, V., Sahai, A.: Resettably secure computation. In: EUROCRYPT, pp. 54\u201371 (2009)","DOI":"10.1007\/978-3-642-01001-9_3"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-85053-3_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"M. Hutter","year":"2008","unstructured":"Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 363\u2013379. Springer, Heidelberg (2008)"},{"key":"3_CR19","unstructured":"I.C.A. Organization: Machine Readable Travel Documents, Doc\u00a09303, Part\u00a01 Machine Readable Passports, 5th edn (2003)"},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication\u00a024(2), 381\u2013395 (2006)","journal-title":"Journal of Selected Areas in Communication"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. ePrint, Report 2006\/137 (2006)","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"3_CR22","unstructured":"Kasper, T., Oswald, D., Paar, C.: New methods for cost-effective side-channel attacks on cryptographic RFIDs. In: The 5th Workshop on RFID Security (RFIDSec) (2009)"},{"key":"3_CR23","unstructured":"Kirschenbaum, I., Wool, A.: How to build a low-cost, extended-range RFID skimmer. ePrint, Report 2006\/054 (2006)"},{"key":"3_CR24","volume-title":"Power Analysis Attacks Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-04444-1_20","volume-title":"Computer Security \u2013 ESORICS 2009","author":"C.Y. Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 321\u2013336. Springer, Heidelberg (2009)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-88313-5_17","volume-title":"Computer Security - ESORICS 2008","author":"C.Y. Ng","year":"2008","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 251\u2013256. Springer, Heidelberg (2008)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. ePrint, Report 2009\/465 (2009)","DOI":"10.1007\/978-3-642-15497-3_2"},{"key":"3_CR28","unstructured":"NXP Semiconductors: MIFARE (May 2007), http:\/\/mifare.net\/"},{"key":"3_CR29","unstructured":"NXP Semiconductors: MIFARE smartcard ICs (April 2010), http:\/\/www.mifare.net\/products\/smartcardics\/"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1145\/1368310.1368352","volume-title":"Proc. of ASIACCS","author":"R.I. Paise","year":"2008","unstructured":"Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292\u2013299. ACM Press, New York (2008)"},{"key":"3_CR31","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. In: International Workshop on Privacy in Location-Based Applications (PiLBA) (2008)"},{"key":"3_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-10433-6_10","volume-title":"Cryptology and Network Security","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 134\u2013153. Springer, Heidelberg (2009)"},{"key":"3_CR33","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Efficient RFID security and privacy with anonymizers. In: The 5th Workshop on RFID Security (RFIDSec) (2009)"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-03511-1_6","volume-title":"Privacy in Location-Based Applications","author":"A.R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol.\u00a05599, pp. 127\u2013150. Springer, Heidelberg (2009)"},{"key":"3_CR35","volume-title":"Enhancing RFID Security and Privacy by Physically Unclonable Functions","author":"A.R. Sadeghi","year":"2010","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Enhancing RFID Security and Privacy by Physically Unclonable Functions. Springer, Heidelberg (2010)"},{"key":"3_CR36","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Workshop on Secure Component and System Identification (SECSI) (2010)"},{"key":"3_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"3_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., et al.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., et al. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 50\u201359. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science XI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17697-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T19:51:47Z","timestamp":1636919507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17697-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176968","9783642176975"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17697-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}