{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:04:02Z","timestamp":1725584642443},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210396"},{"type":"electronic","value":"9783642210402"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21040-2_18","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T05:11:43Z","timestamp":1307077903000},"page":"254-263","source":"Crossref","is-referenced-by-count":8,"title":["Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard"],"prefix":"10.1007","author":[{"given":"Mohammad Hassan","family":"Habibi","sequence":"first","affiliation":[]},{"given":"Mahdi R.","family":"Alagheband","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Transport for London, Oyster card, http:\/\/www.oystercard.co.uk"},{"key":"18_CR2","unstructured":"Michelin Embeds RFID Tags in Tires. RFID Journal, http:\/\/www.rfidjournal.com\/article\/articleview\/269\/1\/1\/ (accessed January 17, 2003)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J.-H. Hoepman","year":"2006","unstructured":"Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 152\u2013167. Springer, Heidelberg (2006)"},{"key":"18_CR4","unstructured":"EPCglobal Inc., http:\/\/www.epcglobalinc.org\/"},{"key":"18_CR5","unstructured":"EPCglobal Inc., EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocols for Communications at 860 MHz \u2013 960 MHz version 1.1.0, Available at [4]"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935308_1","volume-title":"Information and Communications Security","author":"C.H. Lim","year":"2006","unstructured":"Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"18_CR7","unstructured":"Van Deursen, T., Radomirovic, S.: Attacks on RFID protocols. Cryptology ePrint Archive, Report 2008\/310 (2008), http:\/\/eprint.iacr.org\/"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-68914-0_29","volume-title":"Applied Cryptography and Network Security","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Phan, R.C.-W.: Traceable privacy of recent provably-secure RFID protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 479\u2013489. Springer, Heidelberg (2008)"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1016\/j.comnet.2009.11.007","volume":"54","author":"P. Peris-Lopez","year":"2010","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks\u00a054, 1502\u20131508 (2010)","journal-title":"Computer Networks"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H. Chien","year":"2007","unstructured":"Chien, H., Chen, C.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces\u00a029, 254\u2013259 (2007)","journal-title":"Computer Standards & Interfaces"},{"key":"18_CR11","unstructured":"Konidala, D.M., Kim, Z., Kim, K.: A simple and cost-effective RFID tag-reader mutual authentication scheme. In: Proceedings of Int\u2019l Conference on RFID Security, RFIDSec 2007, pp. 141\u2013152 (2007)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Kulseng, L., Yu, Z., Wei, Y., Guan, Y.: Lightweight mutual authentication and ownership transfer for RFID Systems. In: Proceedings of IEEE INFOCOM 2010, pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOM.2010.5462233"},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H.Y. Chien","year":"2007","unstructured":"Chien, H.Y.: SASI: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing\u00a04(4), 337\u2013340 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: Proc. of Wisec 2008, pp. 140\u2013147 (2008)","DOI":"10.1145\/1352533.1352556"},{"key":"18_CR15","unstructured":"Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In: The Symposium on Cryptography and Information Security (2006)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.csi.2008.06.006","volume":"31","author":"D. Han","year":"2009","unstructured":"Han, D., Kwon, D.: Vulnerability of an RFID authentication protocol conforming to EPC Class-1Generation-2 Standards. Computer Standards & Interfaces\u00a031, 648\u2013652 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.comcom.2009.03.010","volume":"32","author":"P. Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications\u00a032, 1185\u20131193 (2009)","journal-title":"Computer Communications"},{"key":"18_CR18","unstructured":"Habibi, M.H., Gardeshi, M., Alagheband, M.R.: Attacks and improvements to a new RFID Authentication protocol. In: Proceedings of Third Workshop on RFID Security: RFIDsec Asia 2011, China (2011)"},{"issue":"4","key":"18_CR19","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"R.C.-W. Phan","year":"2009","unstructured":"Phan, R.C.-W.: Cryptanalysis of a New Ultra lightweight RFID Authentication Protocol \u2013SASI. IEEE Transactions on Dependable and Secure Computing\u00a06(4), 316\u2013320 (2009)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79966-5_1","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"T. Deursen van","year":"2008","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Habibi, M.H., Gardeshi, M., Alagheband, M.R.: Cryptanalysis of two mutual authentication protocols for low-cost RFID. International Journal of Distributed and Parallel Systems\u00a02(1), 103\u2013114","DOI":"10.5121\/ijdps.2011.2109"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"7678","DOI":"10.1016\/j.eswa.2010.04.074","volume":"37","author":"T.-C. Yeh","year":"2010","unstructured":"Yeh, T.-C., Wang, Y.-J., Kuo, T.-C., Wang, S.-S.: Securing RFID systems conforming to EPC Class-1 Generation-2 standard. Expert Systems with Applications\u00a037, 7678\u20137683 (2010)","journal-title":"Expert Systems with Applications"},{"key":"18_CR23","unstructured":"Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, report 2005\/049, http:\/\/eprint.iacr.org\/2005\/049"},{"key":"18_CR24","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: Proceedings of PerCom 2007, pp. 342\u2013347 (2007), http:\/\/eprint.iacr.org\/2006\/137"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-79104-1_19","volume-title":"Information Security Practice and Experience","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Phan, R.C.-W.: Privacy of recent RFID authentication protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 263\u2013277. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21040-2_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:01:50Z","timestamp":1606186910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21040-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210396","9783642210402"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21040-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}