{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:22:25Z","timestamp":1745986945299,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_43","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T09:16:01Z","timestamp":1360401361000},"page":"458-466","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy"],"prefix":"10.1007","author":[{"given":"Shaohui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Sujuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Danwei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"issue":"21","key":"43_CR3","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1049\/el:20052622","volume":"41","author":"H. Gilbert","year":"2005","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ - a Provably Secure Lightweight Authentication Protocol. IET Electronic Letters\u00a041(21), 1169\u20131170 (2005)","journal-title":"IET Electronic Letters"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, pp. 28\u201333. IEEE Computer Society (2006)","DOI":"10.1109\/SECPERU.2006.10"},{"issue":"9","key":"43_CR5","doi-asserted-by":"publisher","first-page":"4339","DOI":"10.1109\/TIT.2008.928290","volume":"54","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory\u00a054(9), 4339\u20134342 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"43_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85230-8_12","volume-title":"Financial Cryptography and Data Security","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: Good Variants of HB\u2009+\u2009 Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 156\u2013170. Springer, Heidelberg (2008)"},{"key":"43_CR7","unstructured":"Frumkin, D., Shamir, A.: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. In: International Workshop on RFID Security, RFIDsec 2009, pp. 62\u201371 (2009)"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: PERCOMW, pp. 342\u2013347. IEEE Computer Society (2007)","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Le, T.V., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS 2007, pp. 242\u2013252. ACM (2007)","DOI":"10.1145\/1229285.1229319"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"43_CR11","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201dPrivacy-friendly\u201d Tags. In: Proceedings of RFID Privacy Workshop. MIT (2003)"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","volume-title":"Selected Areas in Cryptography","author":"D. Hein","year":"2009","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID \u2013 A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 401\u2013413. Springer, Heidelberg (2009)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Singelee, D., Verbauwhede, I.: Low-Cost Untraceable Authentication Protocols for RFID. In: Proceedings of the 3rd ACM Conference on Wireless Network Security, WiSec 2010, pp. 55\u201364. ACM (2010)","DOI":"10.1145\/1741866.1741877"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based Randomized Access Control): Provably Secure RFID Authentication Protocol. In: IEEE International Conference on RFID 2008, pp. 97\u2013104. IEEE (2008)","DOI":"10.1109\/RFID.2008.4519370"},{"key":"43_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 149\u2013161. Springer, Heidelberg (2008)"},{"key":"43_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-16822-2_8","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"T. Deursen van","year":"2010","unstructured":"van Deursen, T., Radomirovi\u0107, S.: EC-RAC: Enriching a Capacious RFID Attack Collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 75\u201390. Springer, Heidelberg (2010)"},{"key":"43_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-16822-2_7","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"J. Fan","year":"2010","unstructured":"Fan, J., Hermans, J., Vercauteren, F.: On the Claimed Privacy of EC-RAC III. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 66\u201374. Springer, Heidelberg (2010)"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. In: IEEE International Conference on RFID, pp. 178\u2013185. IEEE (2009)","DOI":"10.1145\/1741866.1741877"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS, pp. 195\u2013205 (2009)","DOI":"10.1145\/1533057.1533086"},{"issue":"4","key":"43_CR20","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s00145-006-0224-0","volume":"19","author":"M. Girault","year":"2006","unstructured":"Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. Cryptology\u00a019(4), 463\u2013487 (2006)","journal-title":"J. Cryptology"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T20:30:33Z","timestamp":1745958633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}