{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:35:08Z","timestamp":1725489308260},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374005"},{"type":"electronic","value":"9783642374012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_53","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T00:03:25Z","timestamp":1363910605000},"page":"538-549","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Privacy-Preserving RFID Ownership Transfer Protocol"],"prefix":"10.1007","author":[{"given":"Wei","family":"Xin","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Huiping","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1007\/11596042_132","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops","author":"J. Saito","year":"2005","unstructured":"Saito, J., Imamoto, K., Sakurai, K.: Reassignment scheme of an RFID tag\u2019s key for owner transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol.\u00a03823, pp. 1303\u20131312. Springer, Heidelberg (2005)"},{"key":"53_CR2","unstructured":"Kapoor, G., Piramuthu, S.: Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics, 1\u201310 (2011)"},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.J.: Rfid authentication protocol for low-cost tags. In: WISEC, pp. 140\u2013147 (2008)","DOI":"10.1145\/1352533.1352556"},{"key":"53_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-25286-0_11","volume-title":"RFID. Security and Privacy","author":"K. Elkhiyaoui","year":"2012","unstructured":"Elkhiyaoui, K., Blass, E.-O., Molva, R.: ROTIV: RFID Ownership Transfer with Issuer Verification. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 163\u2013182. Springer, Heidelberg (2012)"},{"issue":"1","key":"53_CR5","first-page":"2","volume":"6","author":"S. Sarma","year":"2003","unstructured":"Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes, RSA Laboratories\u00a06(1), 2\u20139 (2003)","journal-title":"Cryptobytes, RSA Laboratories"},{"key":"53_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"53_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"53_CR8","unstructured":"Bringer, J., Chabanne, H., Emmanuelle, D.: HB\u2009+\u2009+\u2009: a Lightweight Authentication Protocol Secure against Some Attacks. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing \u2013 SecPerU 2006, Lyon, France. IEEE Computer Society (June 2006)"},{"key":"53_CR9","volume-title":"RFID Privacy Workshop","author":"M. Ohkubo","year":"2003","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to \u201cPrivacy-Friendly\u201d Tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)"},{"key":"53_CR10","unstructured":"Ohkubo, Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: International Conference on Ubiquitous Computing \u2013 Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004)"},{"key":"53_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private rfid protocol. In: ACM Conference on Computer and Communications Security, pp. 43\u201353 (2009)","DOI":"10.1145\/1653662.1653669"},{"key":"53_CR13","doi-asserted-by":"crossref","unstructured":"Chang-She, M.: Low cost rfid authentication protocol with forward privacy. Chinese Journal of Computers 34(8) (2011)","DOI":"10.3724\/SP.J.1016.2011.01387"},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An Efficient Forward Private RFID Protocol. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) Conference on Computer and Communications Security \u2013 ACM CCS 2009, Chicago, Illinois, USA, pp. 43\u201353. ACM Press (November 2009)","DOI":"10.1145\/1653662.1653669"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Kulseng, L., Yu, Z., Wei, Y., Guan, Y.: Lightweight mutual authentication and ownership transfer for rfid systems. In: INFOCOM, pp. 251\u2013255 (2010)","DOI":"10.1109\/INFCOM.2010.5462233"},{"key":"53_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1007\/978-3-540-74377-4_81","volume-title":"Computational Intelligence and Security","author":"K. Osaka","year":"2007","unstructured":"Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol.\u00a04456, pp. 778\u2013787. Springer, Heidelberg (2007)"},{"issue":"6","key":"53_CR17","doi-asserted-by":"publisher","first-page":"6","DOI":"10.4304\/jcm.2.6.6-13","volume":"2","author":"S. Fouladgar","year":"2007","unstructured":"Fouladgar, S., Afifi, H.: A simple privacy protecting scheme enabling delegation and ownership transfer for rfid tags. JCM\u00a02(6), 6\u201313 (2007)","journal-title":"JCM"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:32:23Z","timestamp":1557599543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}