{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:12:37Z","timestamp":1725570757554},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177132"},{"type":"electronic","value":"9783642177149"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17714-9_18","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T08:27:24Z","timestamp":1291710444000},"page":"246-260","source":"Crossref","is-referenced-by-count":2,"title":["Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains"],"prefix":"10.1007","author":[{"given":"Shaoying","family":"Cai","sequence":"first","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"issue":"4","key":"18_CR2","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology\u00a017(4), 297\u2013319 (2004)","journal-title":"J. Cryptology"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-85893-5_13","volume-title":"Smart Card Research and Advanced Applications","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Provably secure grouping-proofs for rfid tags. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 176\u2013190. Springer, Heidelberg (2008)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T.E. Gamal","year":"1985","unstructured":"Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFID A Proof in Silicon. In: RFIDSec 2008, Budapest, Hungary (July 2008)","DOI":"10.1007\/978-3-642-04159-4_26"},{"key":"18_CR6","first-page":"138","volume-title":"PerSec 2004","author":"A. Juels","year":"2004","unstructured":"Juels, A.: \u201cYoking-Proofs\u201d for RFID Tags. In: Sandhu, R., Thomas, R. (eds.) PerSec 2004, Orlando, Florida, USA, pp. 138\u2013143. IEEE Computer Society, Los Alamitos (March 2004)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-540-79263-5_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"J. Katz","year":"2008","unstructured":"Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 155\u2013169. Springer, Heidelberg (2008)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1007\/978-3-540-72909-9_70","volume-title":"Advances in Web and Network Technologies, and Information Management","author":"C.C. Lin","year":"2007","unstructured":"Lin, C.C., Lai, Y.C., Tygar, J.D., Yang, C.K., Chiang, C.L.: Coexistence proof using chain of timestamps for multiple RFID tags. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb\/WAIM 2007. LNCS, vol.\u00a04537, pp. 634\u2013643. Springer, Heidelberg (2007)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 276\u2013290. Springer, Heidelberg (2006)"},{"key":"18_CR10","first-page":"210","volume-title":"CCS 2004","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Pfitzmann, B., Liu, P. (eds.) CCS 2004, Washington, DC, USA, pp. 210\u2013219. ACM Press, New York (October 2004)"},{"key":"18_CR11","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201cPrivacy-Friendly\u201d Tags. In: RFID Privacy Workshop. MIT, Massachusetts (November 2003)"},{"key":"18_CR12","first-page":"317","volume-title":"PERSER 2006","author":"Piramuthu","year":"2006","unstructured":"Piramuthu: On existence proofs for multiple rfid tags. In: PERSER 2006, Washington, DC, USA, pp. 317\u2013320. IEEE Computer Society, Los Alamitos (2006)"},{"key":"18_CR13","first-page":"621","volume-title":"AINA 2005","author":"J. Saito","year":"2005","unstructured":"Saito, J., Sakurai, K.: Grouping proof for rfid tags. In: AINA 2005, Washington, DC, USA, pp. 621\u2013624. IEEE Computer Society, Los Alamitos (2005)"},{"key":"18_CR14","unstructured":"Song, B.: RFID Tag Ownership Transfer. In: RFIDsec 2008, Budaperst, Hungary (July 2008)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17714-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:47:47Z","timestamp":1559843267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17714-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177132","9783642177149"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17714-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}