{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:12:13Z","timestamp":1757311933339},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_10","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T20:58:40Z","timestamp":1376945920000},"page":"130-141","source":"Crossref","is-referenced-by-count":8,"title":["An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer"],"prefix":"10.1007","author":[{"given":"S\u00fcleyman","family":"Karda\u015f","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Serkan","family":"\u00c7elik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atakan","family":"Arslan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. In: International Conference on Dependable Systems and Networks, pp. 1\u201310 (2010)","DOI":"10.1109\/DSN.2010.5545008"},{"key":"10_CR2","unstructured":"Avoine, G.: Cryptography in Radio Frequency Identification and Fair Exchange Protocols. PhD thesis, EPFL, Lausanne, Switzerland (December 2005)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-16822-2_13","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"G. Avoine","year":"2010","unstructured":"Avoine, G., Coisel, I., Martin, T.: Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 138\u2013157. Springer, Heidelberg (2010)"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1504\/IJACT.2008.021082","volume":"1","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT\u00a01(2), 79\u201390 (2008)","journal-title":"IJACT"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/SECURECOMM.2005.4","volume-title":"SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 59\u201366. IEEE Computer Society, Washington, DC (2005)"},{"key":"10_CR6","first-page":"350","volume-title":"Proceedings of the 22nd Annual Symposium on Foundations of Computer Science","author":"D. Dolev","year":"1981","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, pp. 350\u2013357. IEEE Computer Society, Washington, DC (1981)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Erguler, I., Anarim, E.: Practical attacks and improvements to an efficient radio frequency identification authentication protocol. Concurrency and Computation: Practice and Experience (October 2011)","DOI":"10.1002\/cpe.1838"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-25286-0_10","volume-title":"RFID. Security and Privacy","author":"A. Fern\u00e0ndez-Mir","year":"2012","unstructured":"Fern\u00e0ndez-Mir, A., Trujillo-Rasua, R., Castell\u00e0-Roca, J., Domingo-Ferrer, J.: Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 147\u2013162. Springer, Heidelberg (2012)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Finkenzeller, K.: RFID Handbook. John Wiley and Sons (2003)","DOI":"10.1002\/0470868023"},{"key":"10_CR10","unstructured":"Garfinkel, S., Rosenberg, B.: RFID: Applications, Security, and Privacy. Addison-Wesley (2005)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Ha, J., Moon, S.-J., Nieto, J.M.G., Boyd, C.: Low-Cost and Strong-Security RFID Authentication Protocol. In: EUC Workshops, pp. 795\u2013807 (2007)","DOI":"10.1007\/978-3-540-77090-9_72"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Karda\u015f, S., Levi, A., Murat, E.: Providing Resistance against Server Information Leakage in RFID Systems. In: New Technologies, Mobility and Security \u2013 NTMS 2011, Paris, France, pp. 1\u20137. IEEE Computer Society (February 2011)","DOI":"10.1109\/NTMS.2011.5720587"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935308_1","volume-title":"Information and Communications Security","author":"C.H. Lim","year":"2006","unstructured":"Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210\u2013219. ACM (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"10_CR15","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to \u2018privacy-friendly\u2019 tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 140\u2013147. ACM (2008)","DOI":"10.1145\/1352533.1352556"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Song, B., Mitchell, C.J.: Scalable RFID Security Protocols supporting Tag Ownership Transfer. Computer Communication (March 2010)","DOI":"10.1016\/j.comcom.2010.02.027"},{"key":"10_CR18","unstructured":"Vajda, I., Butty\u00e1n, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: Second Workshop on Security in Ubiquitous Computing \u2013 Ubicomp 2003 (2003)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. In: Bao, F., Miller, S. (eds.) ACM Symposium on Information, Computer and Communications Security \u2013 ASIACCS 2007, Singapore, Republic of Singapore, pp. 242\u2013252. ACM Press (March 2007)","DOI":"10.1145\/1229285.1229319"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:49:02Z","timestamp":1558302542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}