{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:10:35Z","timestamp":1742976635348,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439074"},{"type":"electronic","value":"9783662439081"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43908-1_13","type":"book-chapter","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T12:43:02Z","timestamp":1403786582000},"page":"100-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Another Improvement of LMAP++: An RFID Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Anqi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chaojing","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"R Want","year":"2006","unstructured":"Want, R.: An introduction to RFID technology. IEEE Pervasive Comput. 5(1), 25\u201333 (2006)","journal-title":"IEEE Pervasive Comput."},{"key":"13_CR2","unstructured":"Wen, H.: 2007 RFID development analysis. Chinese Electronic, 2008:50\u201354"},{"key":"13_CR3","unstructured":"Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost RFID tags. In: Proceedings of UBICOMP\u201903 (2003)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Security in Communication Networks","author":"A Juels","year":"2005","unstructured":"Juels, A.: Minimalist cryptography for low-cost RFID tags (extended abstract). In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149\u2013164. Springer, Heidelberg (2005)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Sadighian, A., Jalili, R.: AFMAP: anonymous forward-secure mutual authentication protocols for RFID systems. In: Third IEEE International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009), pp. 31\u201336 (2009)","DOI":"10.1109\/SECURWARE.2009.12"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Sadighian, A., Jalili, R.: FLMAP: a fast lightweight mutual authentication protocol for RFID. In: 16th IEEE International Conference on Networks, New Delhi, India, pp. 1\u20136 (2008)","DOI":"10.1109\/ICON.2008.4772592"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"S Chien","year":"2007","unstructured":"Chien, S.: A lightweight RFID authentication protocol providing strong authentication. IEEE Trans. Dependable Secur. Comput. 4(4), 337\u2013340 (2007)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-00306-6_5","volume-title":"Information Security Applications","author":"P Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID Tags: gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56\u201368. Springer, Heidelberg (2009)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352\u2013361. Springer, Heidelberg (2006)"},{"issue":"17","key":"13_CR10","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1587\/elex.7.1240","volume":"7","author":"M Safkhani","year":"2010","unstructured":"Safkhani, M., Naderi, M., Bagheri, N.: Cryptanalysis of AFMAP. IEICE Electron. Express 7(17), 1240\u20131245 (2010)","journal-title":"IEICE Electron. Express"},{"issue":"2","key":"13_CR11","first-page":"182","volume":"2","author":"M Safkhani","year":"2010","unstructured":"Safkhani, M., Naderi, M., Rashvand, H.: Cryptanalysis of AFMAP. Int. J. Comput. Commun. Technol. 2(2), 182\u2013186 (2010)","journal-title":"Int. J. Comput. Commun. Technol."},{"key":"13_CR12","unstructured":"B\u00e1r\u00e1sz, M., Boros, B.: Passive attack against the M2AP mutual authentication protocol for RFID tags. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007"},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T Cao","year":"2009","unstructured":"Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. IEEE Trans. Dependable Secur. Comput. 6(1), 73\u201377 (2009)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"13_CR14","unstructured":"Hernandez-Castro, J.C., Tapiador, J.M.E., Peris-Lopez, P., Quisquater, J.-J.: Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. Technical report arXiv:0811.4257, Nov 2008"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.H.: Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol. In: Second International Conference on Availability, Reliability and Security \u2013 ARES 2007, Vienna, Austria, April 2007","DOI":"10.1109\/ARES.2007.159"},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RC-W Phan","year":"2009","unstructured":"Phan, R.C.-W.: Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI. IEEE Trans. Dependable Secur. Comput. 6(4), 316\u2013320 (2009)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of RFIDSec06 Workshop on RFID Security, Graz, Austria, 12\u201314 July 2006","DOI":"10.1007\/11833529_93"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: IFIP SEC 2007, Sandton, Gauteng, South Africa, May 2007","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Li, T.: Employing lightweight primitives on low-cost RFID tags for authentication. In: VTC Fall, pp. 1\u20135 (2008)","DOI":"10.1109\/VETECF.2008.290"},{"key":"13_CR20","unstructured":"Safkhani, M., Bagheri, N., Naderi, M., Sanadhya, S.K.: Security analysis of LMAP++, an RFID authentication protocol. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 689\u2013694 (2011)"},{"key":"13_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-29852-3_17","volume-title":"Trust Management VI","author":"JB Gurubani","year":"2012","unstructured":"Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 225\u2013231. Springer, Heidelberg (2012)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-36140-1_2","volume-title":"Radio Frequency Identification","author":"G Avoine","year":"2013","unstructured":"Avoine, G., Carpent, X.: Yet another ultralightweight authentication protocol that is broken. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 20\u201330. Springer, Heidelberg (2013)"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43908-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T19:09:09Z","timestamp":1676401749000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43908-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439074","9783662439081"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43908-1_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"27 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}