{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:50:21Z","timestamp":1767988221452,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642238215","type":"print"},{"value":"9783642238222","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23822-2_31","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:38:34Z","timestamp":1315391914000},"page":"568-587","source":"Crossref","is-referenced-by-count":65,"title":["A New RFID Privacy Model"],"prefix":"10.1007","author":[{"given":"Jens","family":"Hermans","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Pashalidis","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","first-page":"39","volume":"11","author":"F. Armknecht","year":"2010","unstructured":"Armknecht, F., Sadeghi, A.-R., Scafuro, A., Visconti, I., Wachsmann, C.: Impossibility Results for RFID Privacy Notions. Transactions on Computational Science\u00a011, 39\u201363 (2010)","journal-title":"Transactions on Computational Science"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-44987-6_30","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification Protocols Secure against Reset Attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 495\u2013511. Springer, Heidelberg (2001)"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 1\u201312. Springer, Heidelberg (1998)"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-642-03549-4_22","volume-title":"Financial Cryptography and Data Security","author":"J.-M. Bohli","year":"2009","unstructured":"Bohli, J.-M., Pashalidis, A.: Relations Among Privacy Notions. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 362\u2013380. Springer, Heidelberg (2009)"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/1533057.1533086","volume-title":"ASIACCS","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS, pp. 195\u2013205. ACM, New York (2009)"},{"key":"31_CR7","volume-title":"Proceedings of the 2nd IEEE\/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM)","author":"M. Burmester","year":"2006","unstructured":"Burmester, M., Le, T., Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE\/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM). IEEE Press, Los Alamitos (2006)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Canard, S., Coisel, I., Etrog, J., Girault, M.: Privacy-preserving rfid systems: Model and constructions. Cryptology ePrint Archive, Report 2010\/405 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1109\/RFID-TA.2010.5529920"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235\u2013244 (2000)","DOI":"10.1145\/335305.335334"},{"key":"31_CR10","unstructured":"Atmel Corporation. Innovative Silicon IDIC solutions (2007), \n                    \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc4602.pdf"},{"key":"31_CR11","unstructured":"Damg\u00e5rd, I., \u00d8stergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. Cryptology ePrint Archive, Report 2006\/234 (2006), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"31_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-05434-1_9","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"P. D\u2019Arco","year":"2009","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol.\u00a05804, pp. 76\u201387. Springer, Heidelberg (2009)"},{"key":"31_CR13","unstructured":"D\u2019Arco, P., Scafuro, A., Visconti, I.: Semi-Destructive Privacy in DoS-Enabled RFID systems. In: RFIDSec (2009)"},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15497-3_1","volume-title":"Computer Security \u2013 ESORICS 2010","author":"R.H. Deng","year":"2010","unstructured":"Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A New Framework for RFID Privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-01001-9_3","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"V. Goyal","year":"2009","unstructured":"Goyal, V., Sahai, A.: Resettably Secure Computation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 54\u201371. Springer, Heidelberg (2009)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Ha, J., Moon, S.-J., Zhou, J., Ha, J.: A New Formal Proof Model for RFID Location Privacy. In: Jajodia, S., L\u00f3pez, J. (eds.) [19], pp. 267\u2013281","DOI":"10.1007\/978-3-540-88313-5_18"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-85053-3_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"M. Hutter","year":"2008","unstructured":"Hutter, M., Schmidt, J.-M., Plos, T.: RFID and Its Vulnerability to Faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 363\u2013379. Springer, Heidelberg (2008)"},{"key":"31_CR18","unstructured":"I.C.A. Organization. Machine Readable Travel Documents, Doc 9303, Part 1 Machine Readable Passports, 5th edn. (2003)"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-88313-5_9","volume-title":"Computer Security - ESORICS 2008","author":"D. Nali","year":"2008","unstructured":"Nali, D., van Oorschot, P.C.: CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 130\u2013145. Springer, Heidelberg (2008)"},{"key":"31_CR20","first-page":"342","volume-title":"PerCom Workshops","author":"A. Juels","year":"2007","unstructured":"Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: PerCom Workshops, pp. 342\u2013347. IEEE Computer Society, Los Alamitos (2007)"},{"key":"31_CR21","unstructured":"Kasper, T., Oswald, D., Paar, C.: New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs. In: RFIDSec (2009)"},{"key":"31_CR22","volume-title":"Power analysis attacks - revealing the secrets of smart cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks - revealing the secrets of smart cards. Springer, Heidelberg (2007)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., L\u00f3pez, J. (eds.) [19], pp. 251\u2013266","DOI":"10.1007\/978-3-540-88313-5_17"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-04444-1_20","volume-title":"Computer Security \u2013 ESORICS 2009","author":"C.Y. Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 321\u2013336. Springer, Heidelberg (2009)"},{"key":"31_CR25","first-page":"292","volume-title":"ASIACCS 2008","author":"R.-I. Paise","year":"2008","unstructured":"Paise, R.-I., Vaudenay, S.: Mutual Authentication in RFID: Security and Privacy. In: ASIACCS 2008, pp. 292\u2013299. ACM Press, New York (2008)"},{"key":"31_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-00862-7_30","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"T. Plos","year":"2009","unstructured":"Plos, T.: Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 444\u2013458. Springer, Heidelberg (2009)"},{"key":"31_CR27","unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: User Privacy in Transport Systems Based on RFID E-Tickets. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) PiLBA. CEUR Workshop Proceedings, vol.\u00a0397 (2008), \n                    \n                      CEUR-WS.org"},{"key":"31_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-10433-6_10","volume-title":"Cryptology and Network Security","author":"A.-R. Sadeghi","year":"2009","unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Anonymizer-Enabled Security and Privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 134\u2013153. Springer, Heidelberg (2009)"},{"key":"31_CR29","unstructured":"Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Efficient RFID security and privacy with anonymizers. In: RFIDSec (2009)"},{"key":"31_CR30","unstructured":"NXP Semiconductors. MIFARE, \n                    \n                      http:\/\/www.mifare.net\/"},{"key":"31_CR31","first-page":"242","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007","author":"T. Van Le","year":"2007","unstructured":"Van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, pp. 242\u2013252. ACM Press, New York (2007)"},{"key":"31_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"31_CR33","unstructured":"Vaudenay, S.: Invited talk at RFIDSec 2010 (2010)"},{"key":"31_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23822-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:35:32Z","timestamp":1559507732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23822-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238215","9783642238222"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23822-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}