{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:01:19Z","timestamp":1725541279706},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334771"},{"type":"electronic","value":"9783642334788"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33478-8_15","type":"book-chapter","created":{"date-parts":[[2012,9,28]],"date-time":"2012-09-28T01:27:16Z","timestamp":1348795636000},"page":"113-119","source":"Crossref","is-referenced-by-count":0,"title":["A Synchronization Strengthen RFID Authentication Protocol Based on Key Array"],"prefix":"10.1007","author":[{"given":"Yu","family":"Bai","sequence":"first","affiliation":[]},{"given":"Yanlong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511541155","volume-title":"RFID Technology and Applications","author":"S.B. Miles","year":"2008","unstructured":"Miles, S.B., Sarma, S.E., Williams, J.R.: RFID Technology and Applications. Cambridge University Press, New York (2008)"},{"issue":"2","key":"15_CR2","first-page":"319","volume":"2","author":"X. Yao","year":"2011","unstructured":"Yao, X., Dai, H., Zhang, Z., Ge, D., Chen, Y.: RFID-enhanced integrated manufacturing for job-shop floor problems. ICIC Express Letters, Part B: Applications\u00a02(2), 319\u2013324 (2011)","journal-title":"ICIC Express Letters, Part B: Applications"},{"issue":"4","key":"15_CR3","first-page":"1777","volume":"7","author":"M.C. Lu","year":"2011","unstructured":"Lu, M.C., Ku, C.Y., Hwang, L.C., Chao, H.M.: Using smart card in RFID infrastructure to protect consumer privacy. International Journal of Innovative Computing, Information and Control\u00a07(4), 1777\u20131788 (2011)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"issue":"2","key":"15_CR5","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"issue":"6","key":"15_CR6","first-page":"3097","volume":"7","author":"I.C. Lin","year":"2011","unstructured":"Lin, I.C., Wang, C.W., Luo, R.K., You, H.C.: An efficient mutual authentication protocol for RFID systems. International Journal of Innovative Computing, Information and Control\u00a07(6), 3097\u20133106 (2011)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-79104-1_20","volume-title":"Information Security Practice and Experience","author":"J. Lim","year":"2008","unstructured":"Lim, J., Oh, H., Kim, S.: A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 278\u2013289. Springer, Heidelberg (2008)"},{"key":"15_CR8","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low cost RFID. In: Proc. of the Workshop on RFID and Lightweight Cryptography, pp. 17\u201324 (2005)"},{"issue":"12","key":"15_CR9","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/j.comnet.2008.04.016","volume":"52","author":"Y. Chen","year":"2008","unstructured":"Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual-authentication scheme based on quadratic residues for RFID systems. Computer Networks\u00a052(12), 2373\u20132380 (2008)","journal-title":"Computer Networks"},{"issue":"5","key":"15_CR10","first-page":"2341","volume":"6","author":"I.C. Lin","year":"2010","unstructured":"Lin, I.C., Yang, C.W., Tsaur, S.C.: Nonidentifiable rfid privacy protection with ownership transfer. International Journal of Innovative Computing, Information and Control\u00a06(5), 2341\u20132351 (2010)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.comcom.2010.05.011","volume":"34","author":"T.C. Yeh","year":"2011","unstructured":"Yeh, T.C., Wu, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications\u00a034(3), 337\u2013341 (2011)","journal-title":"Computer Communications"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/978-3-540-77090-9_71","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"P. Peris-Lopez","year":"2007","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. In: Denko, M.K., Shih, C.-S., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol.\u00a04809, pp. 781\u2013794. Springer, Heidelberg (2007)"},{"issue":"12","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1049\/iet-com.2010.0625","volume":"5","author":"H. Ning","year":"2011","unstructured":"Ning, H., Liu, H., Mao, J., et al.: Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications\u00a05(12), 1755\u20131768 (2011)","journal-title":"IET Communications"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33478-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:11:15Z","timestamp":1620130275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33478-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334771","9783642334788"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33478-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}