{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:55Z","timestamp":1740099175231,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811327117"},{"type":"electronic","value":"9789811327124"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2712-4_4","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:37:15Z","timestamp":1537875435000},"page":"46-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Analysis and Verification for Three-Party Authentication Protocol of RFID"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1459-4255","authenticated-orcid":false,"given":"Jia","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2717-7060","authenticated-orcid":false,"given":"Meihua","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6441-2309","authenticated-orcid":false,"given":"Ke","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5481-008X","authenticated-orcid":false,"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-2723","authenticated-orcid":false,"given":"Xiaomei","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"issue":"09","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3969\/j.issn.1005-152x.2014.05.001","volume":"33","author":"Z Wang","year":"2014","unstructured":"Wang, Z., Yan, X., Sun, B., et al.: Review and outlook of studies on application of RFID technology. Logist. Technol. 33(09), 1\u20135 (2014). \nhttps:\/\/doi.org\/10.3969\/j.issn.1005-152x.2014.05.001","journal-title":"Logist. Technol."},{"issue":"32","key":"4_CR2","first-page":"17","volume":"2015","author":"B Li","year":"2015","unstructured":"Li, B.: Overview of RFID security authentication protocol. Sci. Technol. Innov. Her. 2015(32), 17\u201319 (2015)","journal-title":"Sci. Technol. Innov. Her."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Shi, Z., Xia, Y., Yu, C.: A strong RFID mutual authentication protocol based on a lightweight public-key cryptosystem. Inst. Adv. Eng. Sci. 12(3). \nhttp:\/\/dx.doi.org\/10.11591\/telkomnika.v12i3.4517","DOI":"10.11591\/telkomnika.v12i3.4517"},{"issue":"5","key":"4_CR4","first-page":"6","volume":"48","author":"Q Cai","year":"2009","unstructured":"Cai, Q., Zhan, Y., Yu, S., et al.: RFID communication security protocol based on NTRU public key cryptosystem. Acta Scientiarum Naturalium Universitatis Sunyatseni 48(5), 6\u201311 (2009)","journal-title":"Acta Scientiarum Naturalium Universitatis Sunyatseni"},{"issue":"35","key":"4_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3778\/j.issn.1002-8331.1105-0409","volume":"48","author":"H Yao","year":"2012","unstructured":"Yao, H., Liu, C.: Authentication protocol based on AES and NTRU for RFID. Comput. Eng. Appl. 48(35), 80\u201384 (2012). \nhttps:\/\/doi.org\/10.3778\/j.issn.1002-8331.1105-0409","journal-title":"Comput. Eng. Appl."},{"issue":"4","key":"4_CR6","first-page":"271","volume":"29","author":"B Li","year":"2012","unstructured":"Li, B.: An NTRU public key encryption system based RFID authentication protocol. Comput. Appl. Softw. 29(4), 271\u2013278 (2012)","journal-title":"Comput. Appl. Softw."},{"issue":"12","key":"4_CR7","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3969\/j.issn.1000-386x.2015.12.070","volume":"32","author":"Q Deng","year":"2015","unstructured":"Deng, Q., Yang, S.: Research on RFID three-way mutual authentication protocol based on public key cryptosystem. Comput. Appl. Softw. 32(12), 298\u2013301 (2015). \nhttps:\/\/doi.org\/10.3969\/j.issn.1000-386x.2015.12.070","journal-title":"Comput. Appl. Softw."},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Hao, X., Yang, P., Kun, L.: NTRU-based RFID three-party authentication protocol. Comput. Eng. Appl. (2014). \nhttps:\/\/doi.org\/10.3778\/j.issn.1002-8331.1305-0201","DOI":"10.3778\/j.issn.1002-8331.1305-0201"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1049\/cje.2015.01.031","volume":"24","author":"M Xiao","year":"2015","unstructured":"Xiao, M., Ma, C., Deng, C., et al.: A novel approach to automatic security protocol analysis based on authentication event logic. Chin. J. Electron. 24(1), 187\u2013192 (2015). \nhttps:\/\/doi.org\/10.1049\/cje.2015.01.031","journal-title":"Chin. J. Electron."},{"issue":"5","key":"4_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Trans. Softw. Eng. 23(5), 279\u2013295 (1997)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-46017-9_14","volume-title":"Model Checking Software","author":"Paolo Maggi","year":"2002","unstructured":"Maggi, P., Sisto, R.: Using SPIN to verify security properties of cryptographic protocols. In: SPIN, vol. 2, pp. 187\u2013204 (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-46017-9_14"},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"S2","key":"4_CR13","first-page":"136","volume":"33","author":"L Wang","year":"2013","unstructured":"Wang, L., Peng, S.: Research on RFID multi-authentication protocol and security analysis. J. Comput. Appl. 33(S2), 136\u2013138 (2013)","journal-title":"J. Comput. Appl."},{"key":"4_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-981-10-6893-5_9","volume-title":"Theoretical Computer Science","author":"W Li","year":"2017","unstructured":"Li, W., Xiao, M., Li, Y., Mei, Y., Zhong, X., Tu, J.: Formal analysis and verification for an ultralightweight authentication protocol RAPP of RFID. In: Du, D., Li, L., Zhu, E., He, K. (eds.) NCTCS 2017. CCIS, vol. 768, pp. 119\u2013132. Springer, Singapore (2017). \nhttps:\/\/doi.org\/10.1007\/978-981-10-6893-5_9"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Bruce, N., Kim, H., Kang, Y., Lee, Y., Lee, H.: On modeling protocol-based clustering tag in RFID systems with formal security analysis. In: IEEE, International Conference on Advanced Information NETWORKING and Applications, pp. 498\u2013505 (2015). \nhttps:\/\/doi.org\/10.1109\/aina.2015.227","DOI":"10.1109\/aina.2015.227"},{"issue":"06A","key":"4_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3969\/j.issn.1002-137X.2013.z1.018","volume":"40","author":"G Hou","year":"2013","unstructured":"Hou, G.: Survey of state explosion problem in model checking. Comput. Sci. 40(06A), 77\u201386 (2013). \nhttps:\/\/doi.org\/10.3969\/j.issn.1002-137X.2013.z1.018","journal-title":"Comput. Sci."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3969\/j.issn.1009-3486.2004.05.003","volume":"05","author":"M Xiao","year":"2004","unstructured":"Xiao, M., Xue, J.: Formal description of properties of concurrency system by temporal logic. J. Nav. Univ. Eng. 05, 10\u201313 (2004). \nhttps:\/\/doi.org\/10.3969\/j.issn.1009-3486.2004.05.003","journal-title":"J. Nav. Univ. Eng."}],"container-title":["Communications in Computer and Information Science","Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2712-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:38:37Z","timestamp":1537875517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-2712-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811327117","9789811327124"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2712-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NCTCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Conference of Theoretical Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nctcs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itcs.shufe.edu.cn\/nctcs2018\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}