{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:25:44Z","timestamp":1725715544819},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_7","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T04:16:01Z","timestamp":1360383361000},"page":"68-74","source":"Crossref","is-referenced-by-count":7,"title":["A Lightweight RFID Mutual Authentication Protocol with Ownership Transfer"],"prefix":"10.1007","author":[{"given":"Xiaotong","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yandong","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","first-page":"581","volume":"29","author":"Y.-B. Zhou","year":"2006","unstructured":"Zhou, Y.-B., Feng, D.-G.: Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers\u00a029(4), 581\u2013589 (2006)","journal-title":"Chinese Journal of Computers"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"7_CR3","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security, SCIS 2004, Sendai, pp. 719\u2013724 (2004)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Proceedings of the 11th-ACM Conference on Computer and Communications Security, CCS 2004, pp. 210\u2013219 (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","volume-title":"Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 70\u201384. Springer, Heidelberg (2005)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, PERCOMW 2004, pp. 210\u2013219 (2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"7_CR7","unstructured":"Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on Cryptography and Information Security (2006)"},{"key":"7_CR8","unstructured":"Deuresen, T., Radomirovic, S.: Attacks on RFID protocols (Version 1.1). Technical report (2009), http:\/\/eprint.iacr.org\/2008\/310"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H.-Y. Chien","year":"2007","unstructured":"Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Proceedings of Computer Standards Interfaces\u00a029(2), 254\u2013259 (2007)","journal-title":"Proceedings of Computer Standards Interfaces"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-03944-7_4","volume-title":"Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks","author":"T. Deursen van","year":"2009","unstructured":"van Deursen, T., Radomirovi\u0107, S.: Algebraic Attacks on RFID Protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 38\u201351. Springer, Heidelberg (2009)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-77092-3_37","volume-title":"Embedded and Ubiquitous Computing","author":"H.-Y. Chien","year":"2007","unstructured":"Chien, H.-Y., Huang, C.-W.: A Lightweight RFID Protocol Using Substring. In: Kuo, T.-W., Sha, E., Guo, M., Yang, L.T., Shao, Z. (eds.) EUC 2007. LNCS, vol.\u00a04808, pp. 422\u2013431. Springer, Heidelberg (2007)"},{"key":"7_CR12","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3233\/JCS-2010-0409","volume":"19","author":"C.-Y. Ng","year":"2011","unstructured":"Ng, C.-Y., Susilo, W., Mu, Y.: Practical RFID ownership transfer scheme. Journal of Computer Security\u00a019, 319\u2013341 (2011)","journal-title":"Journal of Computer Security"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-25243-3_6","volume-title":"Information and Communications Security","author":"Y. Jin","year":"2011","unstructured":"Jin, Y., Sun, H., Xin, W., Luo, S., Chen, Z.: Lightweight RFID Mutual Authentication Protocol against Feasible Problems. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol.\u00a07043, pp. 69\u201377. Springer, Heidelberg (2011)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","volume-title":"Fast Software Encryption","author":"A. Shamir","year":"2008","unstructured":"Shamir, A.: SQUASH \u2013 A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 144\u2013157. Springer, Heidelberg (2008)"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T10:29:03Z","timestamp":1562668143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}