{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:04:04Z","timestamp":1725584644495},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210396"},{"type":"electronic","value":"9783642210402"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21040-2_5","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T05:11:43Z","timestamp":1307077903000},"page":"69-84","source":"Crossref","is-referenced-by-count":6,"title":["An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Avoine, G.: RFID Security and Privacy Lounge, http:\/\/www.avoine.net\/rfid\/"},{"key":"5_CR2","volume-title":"Proceedings of the First Annual Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the First Annual Conference on Computer and Communications Security. ACM, New York (1993)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrong, J., Gilbert, H.: An Efficient Forward Private RFID Protocol. In: 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 43\u201353 (2009)","DOI":"10.1145\/1653662.1653669"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-13858-4_4","volume-title":"Fast Software Encryption","author":"O. Billet","year":"2010","unstructured":"Billet, O., Etrog, J., Gilbert, H.: Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 55\u201374. Springer, Heidelberg (2010)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology, Revisited. In: Proceedings of ACM STOC (1998)","DOI":"10.1145\/276698.276741"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. Computer and System Sci.\u00a018, 143\u2013154 (1979)","journal-title":"J. Computer and System Sci."},{"key":"5_CR8","unstructured":"D\u2019Arco, P.: An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control, http:\/\/www.dia.unisa.it\/paodar"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In: 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS 2009). LNCS, vol.\u00a05304, pp. 76\u201387 (2009)","DOI":"10.1007\/978-3-642-05434-1_9"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., \u00d8stergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. In: Proceedings of the RSA Conference, Cryptographers\u2019 Track, pp. 318\u2013332 (2008)","DOI":"10.1007\/978-3-540-79263-5_20"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Deng, R., Li, Y., Yao, A., Yung, M., Zhao, Y.: A New Framework for RFID Privacy, eprint archive, report no. 2010\/059, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-15497-3_1"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15497-3_1","volume-title":"Computer Security \u2013 ESORICS 2010","author":"R. Deng","year":"2010","unstructured":"Deng, R., Li, Y., Yung, M., Zhao, Y.: A New Framework for RFID Privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 1\u201318. Springer, Heidelberg (2010)"},{"issue":"8","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/JPROC.2007.900324","volume":"95","author":"A. Juels","year":"2007","unstructured":"Juels, A.: The Vision of Secure RFID. Proceedings of the IEEE\u00a095(8), 1507\u20131508 (2007)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"5_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"A. Juels","year":"2005","unstructured":"Juels, A., Pappu, R., Garfinkel, S.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"5_CR15","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: Proc. of the International Conference on Ubiquitous Computing Ubicomp Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Paise, R., Vaudenay, S.: Mutual Authentication in RFID: Security and Privacy. In: Proceedings of Aisaccs 2008, Lecture Notes in Computer Science, pp. 292\u2013299 (2008)","DOI":"10.1145\/1368310.1368352"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure Rfid Authentication and Authenticated Key Exchange. In: Proc. of ASIACCS 2007, pp. 242\u2013252 (2007)","DOI":"10.1145\/1229285.1229319"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D.R. Stinson","year":"1994","unstructured":"Stinson, D.R.: Universal hashing and authentication codes. Designs, Codes and Cryptography\u00a0(4), 369\u2013380 (1994)","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022(3), 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21040-2_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T13:34:36Z","timestamp":1637760876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21040-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210396","9783642210402"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21040-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}