{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:00Z","timestamp":1742914020756,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":4,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_7","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"41-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation"],"prefix":"10.1007","author":[{"given":"Yong-Woon","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Im-Yeong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"5","key":"7_CR1","first-page":"371","volume":"5","author":"BJ Kang","year":"2008","unstructured":"Kang, B.J., Im, E.G.: RFID mutual authentication protocol for an RFID system. J. Secur. Eng. 5(5), 371\u2013380 (2008)","journal-title":"J. Secur. Eng."},{"issue":"3","key":"7_CR2","first-page":"155","volume":"10","author":"WS Bae","year":"2012","unstructured":"Bae, W.S.: Design of an authentication protocol for privacy protection in RFID systems. J. Digit. Policy Manag. 10(3), 155\u2013160 (2012)","journal-title":"J. Digit. Policy Manag."},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.7840\/kics.2013.38C.1.12","volume":"38","author":"S Oh","year":"2013","unstructured":"Oh, S., Lee, C., Yun, T., Chung, K., Ahn, K.: Improved authentication protocol for privacy protection in RFID systems. J. KICS 38(1), 12\u201318 (2013)","journal-title":"J. KICS"},{"issue":"5","key":"7_CR4","doi-asserted-by":"publisher","first-page":"581","DOI":"10.7840\/kics.2016.41.5.581","volume":"41","author":"JY Kim","year":"2016","unstructured":"Kim, J.Y., Won, D.H.: Security analysis and improvements of authentication protocol for privacy protection in RFID systems. J. KICS 41(5), 581\u2013591 (2016)","journal-title":"J. KICS"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T12:22:00Z","timestamp":1533385320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_7","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}