{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T02:17:13Z","timestamp":1673576233911},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,5,29]],"date-time":"2011-05-29T00:00:00Z","timestamp":1306627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s00779-011-0393-1","type":"journal-article","created":{"date-parts":[[2011,5,28]],"date-time":"2011-05-28T05:23:16Z","timestamp":1306560196000},"page":"337-349","source":"Crossref","is-referenced-by-count":10,"title":["Security flaws in a recent RFID delegation protocol"],"prefix":"10.1007","volume":"16","author":[{"given":"Imran","family":"Erguler","sequence":"first","affiliation":[]},{"given":"Emin","family":"Anarim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,29]]},"reference":[{"key":"393_CR1","unstructured":"Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to \"privacy-friendly\" tags. In: RFID privacy workshop. MIT, MA"},{"key":"393_CR2","doi-asserted-by":"crossref","unstructured":"Henrici D, M\u00fcller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: International workshop on pervasive computing and communication security\u2014PerSec 2004. IEEE Computer Society, Florida, USA, pp 149\u2013153","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"393_CR3","doi-asserted-by":"crossref","unstructured":"Molnar D, Wagner D (2004) Privacy and security in Library RFID: issues, practices, and architectures. In: Conference on computer and communications security. ACM CCS, Washington DC, USA, pp 210\u2013219","DOI":"10.1145\/1030083.1030112"},{"key":"393_CR4","doi-asserted-by":"crossref","unstructured":"Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed database environment. In: International conference on security in pervasive computing\u2014SPC 2005. Lecture Notes in Computer Science, Springer-Verlag 3450:70\u201384","DOI":"10.1007\/978-3-540-32004-3_9"},{"key":"393_CR5","unstructured":"Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attacks. In: Conference on security and privacy for emerging areas in communication networks\u2014securecomm, Athens, Greece"},{"key":"393_CR6","doi-asserted-by":"crossref","unstructured":"Karthikeyan S, Nesterenko N (2005) RFID security without extensive cryptography. In: Workshop on security of Ad Hoc and sensor networks\u2014SASN\u201905. Alexandria, Virginia, USA, pp 63\u201367","DOI":"10.1145\/1102219.1102229"},{"key":"393_CR7","unstructured":"Duc DN, Park J, Lee H, Kim K (2006) Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In: Symposium on cryptography and information security. Hiroshima, Japan"},{"issue":"2","key":"393_CR8","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H Chien","year":"2007","unstructured":"Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Stand Interfaces 29(2):254\u2013259","journal-title":"Comput Stand Interfaces"},{"key":"393_CR9","doi-asserted-by":"crossref","unstructured":"Ha JC, Moon SJ, Nieto JMG, Boyd C (2007) Low-cost and strong-security RFID authentication protocol. In: EUC workshops. Lecture Notes in Computer Science, Springer-Verlag 4809:795\u2013807","DOI":"10.1007\/978-3-540-77090-9_72"},{"key":"393_CR10","doi-asserted-by":"crossref","unstructured":"Tsudik G (2007) A family of dunces: trivial RFID identification and authentication protocols. Cryptology ePrint Archive, Report 2006\/015","DOI":"10.1007\/978-3-540-75551-7_4"},{"key":"393_CR11","doi-asserted-by":"crossref","unstructured":"Song B, Mitchell CJ (2008) RFID authentication protocol for low-cost tags. In: ACM conference on wireless network security\u2014WiSec\u201908. ACM Press, Virginia, USA, pp 140\u2013147","DOI":"10.1145\/1352533.1352556"},{"key":"393_CR12","unstructured":"Shaoying C, Li Y, Li T, Deng R (2009) Attacks and improvements to an RFID mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security\u2014WiSec\u201909. Zurich, Switzerland"},{"key":"393_CR13","doi-asserted-by":"crossref","unstructured":"Avoine G (2010) RFID security & privacy lounge. http:\/\/www.avoine.net\/rfid","DOI":"10.1007\/978-1-4419-5906-5_134"},{"key":"393_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781420068405","volume-title":"Security in RFID and sensor networks","author":"Y Zhang","year":"2009","unstructured":"Zhang Y, Kitsos P (2009) Security in RFID and sensor networks. Auerbach Publications, MA"},{"key":"393_CR15","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34:556\u2013566","journal-title":"Comput Commun"},{"key":"393_CR16","unstructured":"Fouladgar S, Afifi H (2007) An efficient delegation and transfer of ownership protocol for RFID tags. In: First international EURASIP workshop on RFID technology. Vienna, Austria"},{"key":"393_CR17","doi-asserted-by":"crossref","unstructured":"Molnar D, Soppera A, Wagner D (2005) A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Selected areas in cryptography\u2014SAC 2005. Lecture Notes in Computer Science, Springer-Verlag 3897:276\u2013290","DOI":"10.1007\/11693383_19"},{"key":"393_CR18","doi-asserted-by":"crossref","unstructured":"Lim C, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Conference on information and communications security\u2014ICICS\u201906. Lecture Notes in Computer Science, Springer-Verlag 4307:1\u201320","DOI":"10.1007\/11935308_1"},{"issue":"6","key":"393_CR19","doi-asserted-by":"crossref","first-page":"6","DOI":"10.4304\/jcm.2.6.6-13","volume":"2","author":"S Fouladgar","year":"2007","unstructured":"Fouladgar S, Afifi H (2007) A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags. J Commun 2(6):6\u201313","journal-title":"J Commun"},{"key":"393_CR20","doi-asserted-by":"crossref","unstructured":"Avoine G, Lauradoux C, Martin T (2009) When compromised readers meet RFID. In: Workshop on information security applications\u2014WISA\u201909. Lecture Notes in Computer Science, Springer-Verlag 5932:36\u201350","DOI":"10.1007\/978-3-642-10838-9_4"},{"key":"393_CR21","doi-asserted-by":"crossref","unstructured":"Avoine G, Oechslin P (2005) RFID traceability: a multilayer problem. In: Financial cryptography\u2014FC\u201905. Lecture Notes in Computer Science, Springer-Verlag 3570:125\u2013140","DOI":"10.1007\/11507840_14"},{"key":"393_CR22","doi-asserted-by":"crossref","unstructured":"Karygiannis A., Phillips T, Tsibertzopoulos A (2006) RFID security: a taxonomy of risk. In: Proceedings of the 1st international conference on communications and networking in China\u2014ChinaCom\u201906, October 2006, Beijing, China, pp 1\u20137","DOI":"10.1109\/CHINACOM.2006.344722"},{"key":"393_CR23","unstructured":"Burmester M, de Medeiros B (2007) RFID security: attacks, countermeasures and challenges. In: Proceedings of the 5th RFID academic convocation. The RFID Journal Conference"},{"key":"393_CR24","unstructured":"van Deursen T, Radomirovic S (2009) Attacks on RFID protocols. Cryptology ePrint Archive, Report 2008\/310"},{"issue":"5","key":"393_CR25","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Frontiers 12(5):491\u2013505","journal-title":"Inf Syst Frontiers"},{"key":"393_CR26","unstructured":"Avoine G (2005) Adversarial model for radio frequency identification. Cryptology ePrint Archieve, Report 2005\/049"},{"key":"393_CR27","doi-asserted-by":"crossref","unstructured":"Vaudenay S (2007) On privacy models for RFID. In Advances in Cryptology \u2013 ASIACRYPT 2007. Lecture Notes in Computer Science, Springer-Verlag 4833:68\u201387","DOI":"10.1007\/978-3-540-76900-2_5"},{"key":"393_CR28","doi-asserted-by":"crossref","unstructured":"Juels A, Weis S, (2007) Defining strong privacy for RFID. In: Proceedings of IEEE PerCom\u201907, pp 342\u2013347","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"393_CR29","unstructured":"Ouafi K, Phan RC\u2013W, (2008) Traceable privacy of recent provably\u2013secure RFID protocols, In: Proceedings of the 6th international conference on applied cryptography and network security. NewYork, NY, USA, pp 479\u2013489"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0393-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0393-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0393-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T18:15:51Z","timestamp":1592590551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0393-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,29]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["393"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0393-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,29]]}}}