{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T01:10:04Z","timestamp":1745197804060,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_36","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"476-489","source":"Crossref","is-referenced-by-count":7,"title":["A Secure and Private RFID Authentication Protocol under SLPN Problem"],"prefix":"10.1007","author":[{"given":"Mohammad S. I.","family":"Mamun","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Mohammad S.","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-642-20465-4_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"E. Kiltz","year":"2011","unstructured":"Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 7\u201326. Springer, Heidelberg (2011)"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"36_CR4","unstructured":"Cid, C., Robshaw, M.: The eSTREAM Portfolio 2009 Annual Update (July 2009), http:\/\/www.ecrypt.eu.org\/stream\/"},{"issue":"3","key":"36_CR5","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/s00145-010-9061-2","volume":"23","author":"J. Katz","year":"2010","unstructured":"Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology\u00a023(3), 402\u2013421 (2010)","journal-title":"Journal of Cryptology"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005\/237 (2005), http:\/\/eprint.iacr.org\/","DOI":"10.1049\/el:20052622"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB++: a lightweight authentication protocol secure against some attacks. In: SecPerU, pp. 28\u201333 (2006)","DOI":"10.1109\/SECPERU.2006.10"},{"issue":"9","key":"36_CR8","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks\u00a051(9), 2262\u20132267 (2007)","journal-title":"Computer Networks"},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85230-8_12","volume-title":"Financial Cryptography and Data Security","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good Variants of HB\u2009+\u2009 Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 156\u2013170. Springer, Heidelberg (2008)"},{"key":"36_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB\u2009+\u2009. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Overbeck, R., Vaudenay, S.: On the Security of HB# against a Man-in-the-Middle Attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 108\u2013124. Springer, Heidelberg (2008)"},{"issue":"9","key":"36_CR12","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1090\/S0002-9904-1920-03332-X","volume":"26","author":"E.H. Moore","year":"1920","unstructured":"Moore, E.H.: On the reciprocal of the general algebraic matrix. Bulletin of the American Mathematical Society\u00a026(9), 394\u2013395 (1920), doi:10.1090\/S0002-9904-1920-03322-7","journal-title":"Bulletin of the American Mathematical Society"},{"key":"36_CR13","unstructured":"Thuc, D.N., Hue, T.B.P., Van, H.D.: An Efficient Pseudo Inverse Matrix-Based Solution for Secure Auditing. In: IEEE-RIVF, pp. 7\u201312 (2010) ISBN: 978-1-4244-8072-2"},{"key":"36_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y. Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 65\u201382. Springer, Heidelberg (2002)"},{"key":"36_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","volume-title":"Computer Security \u2013 ESORICS 2011","author":"J. Hermans","year":"2011","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A New RFID Privacy Model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol.\u00a06879, pp. 568\u2013587. Springer, Heidelberg (2011)"},{"key":"36_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-04444-1_20","volume-title":"Computer Security \u2013 ESORICS 2009","author":"C.Y. Ng","year":"2009","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 321\u2013336. Springer, Heidelberg (2009)"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Cao, X., O\u2019Neill, M.: F-HB: An Efficient Forward Private Protocol. In: Workshop on Lightweight Security and Privacy: Devices, Protocols and Applications (Lightsec 2011), Istanbul, Turkey, March 14-15 (2011)","DOI":"10.1109\/LightSec.2011.15"},{"key":"36_CR18","unstructured":"Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. In: ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) (March 2007)"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An Efficient Forward Private RFID Protocol. In: ACM Conference on Computer and Communications Security (CCS) (November 2009)","DOI":"10.1145\/1653662.1653669"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-13858-4_4","volume-title":"Fast Software Encryption","author":"O. Billet","year":"2010","unstructured":"Billet, O., Etrog, J., Gilbert, H.: Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 55\u201374. Springer, Heidelberg (2010)"},{"key":"36_CR21","unstructured":"Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash- Based RFID Protocol. In: IEEE International Workshop on Pervasive Computing and Communication Security (March 2005)"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Leng, X., Mayes, K., Markantonakis, K.: HB-MP+ Protocol: An Improvement on the HB-MP Protocol. In: IEEE International Conference on RFID, pp. 118\u2013124 (April 2008)","DOI":"10.1109\/RFID.2008.4519342"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Tsudik, G.: Ya-trap: Yet another trivial rfid authentication protocol. In: PerCom Workshops, pp. 640\u2013643 (2006)","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"36_CR24","unstructured":"Chatmon, C., van Le,T., Burmester, M.: Secure anonymous rfid authentication protocols. Computer & Information Sciences, Florida AM University, Tech. Rep. (2006)"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"He, L., Jin, S., Zhang, T., Li, N.: An enhanced 2-pass optimistic anonymous rfid authentication protocol with forward security. In: WiCOM, pp. 1\u20134 (2009)","DOI":"10.1109\/WICOM.2009.5303448"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:42:29Z","timestamp":1745196149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}