{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:42:30Z","timestamp":1725745350888},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403910"},{"type":"electronic","value":"9783642403927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40392-7_9","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T20:58:40Z","timestamp":1376945920000},"page":"114-129","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Moriyama","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Abyaneh, M.R.S.: On the privacy of two tag ownership transfer protocols for RFIDs. In: ICITST 2011, pp. 11\u201314. IEEE (2011)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-13858-4_4","volume-title":"Fast Software Encryption","author":"O. Billet","year":"2010","unstructured":"Billet, O., Etrog, J., Gilbert, H.: Lightweight privacy preserving authentication for RFID using a stream cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 55\u201374. Springer, Heidelberg (2010)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"9_CR4","unstructured":"Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: RFIDSec 2008 (2008)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Cai, S., Li, Y., Li, Y., Deng, R.H.: Attacks and improvements to an RFID mutual authentication protocol and its extensions. In: WiSec 2009, pp. 51\u201358. ACM (2009)","DOI":"10.1145\/1514274.1514282"},{"issue":"3","key":"9_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s00779-011-0393-1","volume":"16","author":"I. Erguler","year":"2012","unstructured":"Erguler, I., Anarim, E.: Security flaws in a recent RFID delegation protocol. J. Pers. Ubiquit. Comp.\u00a016(3), 337\u2013349 (2012)","journal-title":"J. Pers. Ubiquit. Comp."},{"key":"9_CR7","unstructured":"Elkhiyaoui, K., Blass, E.-O., Molva, R.: ROTIV: RFID ownership transfer with issuer verification. ePrint Archive 2010\/634 (2010)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-25286-0_11","volume-title":"RFID. Security and Privacy","author":"K. Elkhiyaoui","year":"2012","unstructured":"Elkhiyaoui, K., Blass, E.-O., Molva, R.: ROTIV: RFID ownership transfer with issuer verification. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 163\u2013182. Springer, Heidelberg (2012)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-25286-0_10","volume-title":"RFID. Security and Privacy","author":"A. Fern\u00e0ndez-Mir","year":"2012","unstructured":"Fern\u00e0ndez-Mir, A., Trujillo-Rasua, R., Castell\u00e0-Roca, J., Domingo-Ferrer, J.: A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 147\u2013162. Springer, Heidelberg (2012)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Transactions on Information and System Security\u00a013(1) (2009)","DOI":"10.1145\/1609956.1609963"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kardas, S., Akg\u00fcn, M., Kiraz, M.S., Demirci, H.: Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems. In: LightSec 2011, pp. 20\u201325. IEEE (2011)","DOI":"10.1109\/LightSec.2011.10"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935308_1","volume-title":"Information and Communications Security","author":"C.H. Lim","year":"2006","unstructured":"Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 276\u2013290. Springer, Heidelberg (2006)"},{"issue":"2","key":"9_CR14","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3233\/JCS-2010-0409","volume":"19","author":"C.Y. Ng","year":"2011","unstructured":"Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: Practical RFID ownership transfer scheme. J. Comput. Sec.\u00a019(2), 319\u2013341 (2011)","journal-title":"J. Comput. Sec."},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-68914-0_29","volume-title":"Applied Cryptography and Network Security","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Phan, R.C.-W.: Traceable privacy of recent provably-secure RFID protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 479\u2013489. Springer, Heidelberg (2008)"},{"key":"9_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1007\/978-3-540-74377-4_81","volume-title":"Computational Intelligence and Security","author":"K. Osaka","year":"2007","unstructured":"Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol.\u00a04456, pp. 778\u2013787. Springer, Heidelberg (2007)"},{"issue":"9","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1016\/j.comnet.2009.11.007","volume":"54","author":"P. Peris-Lopez","year":"2010","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Li, T., Li, Y.: Vulnerability analysis of RFID protocols for tag ownership transfer. J. Comp. Net.\u00a054(9), 1502\u20131508 (2010)","journal-title":"J. Comp. Net."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Paise, R.I., Vaudenay, S.: Mutual authentication in RFID. In: ASIACCS 2008, pp. 292\u2013299. ACM (2008)","DOI":"10.1145\/1368310.1368352"},{"key":"9_CR19","series-title":"AISC","first-page":"229","volume-title":"Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE 2011)","author":"W. Shaohui","year":"2011","unstructured":"Shaohui, W.: Analysis and Design of RFID Tag Ownership Transfer Protocol. In: Jiang, L. (ed.) ICCE 2011. AISC, vol.\u00a0110, pp. 229\u2013236. Springer, Heidelberg (2011)"},{"issue":"4","key":"9_CR20","first-page":"1","volume":"34","author":"B. Song","year":"2011","unstructured":"Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. ComCom\u00a034(4), 1\u201327 (2011)","journal-title":"ComCom"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40392-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:49:14Z","timestamp":1558302554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40392-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403910","9783642403927"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40392-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}