{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:14:57Z","timestamp":1763388897268},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10660-014-9165-0","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T05:54:28Z","timestamp":1414994068000},"page":"97-120","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["ECC-based untraceable authentication for large-scale active-tag RFID systems"],"prefix":"10.1007","volume":"15","author":[{"given":"Yalin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jue-Sam","family":"Chou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,4]]},"reference":[{"key":"9165_CR1","doi-asserted-by":"crossref","unstructured":"Abid, M., & Afifi, H. (2008). Secure E-passport protocol using elliptic curve Diffie\u2013Hellman key agreement protocol. In International Conference on Information Assurance and Security (pp. 99\u2013102).","DOI":"10.1109\/IAS.2008.22"},{"key":"9165_CR2","doi-asserted-by":"crossref","unstructured":"Abid, M., Kanade, S., Petrovska-Delacr\u00e9taz, D., Dorizzi, B., & Afifi, H. (2010). Iris based authentication mechanism for E-passports. In International Workshop on Security and Communication Networks (IWSCN\u201910) (pp. 1\u20135).","DOI":"10.1109\/IWSCN.2010.5497990"},{"key":"9165_CR3","doi-asserted-by":"crossref","unstructured":"Ahamed, S. I., Rahman, F., & Hoque, M. E. (2008). ERAP: ECC based RFID authentication protocol. In IEEE International Workshop on Future Trends of Distributed Computing Systems (pp. 219\u2013225).","DOI":"10.1109\/FTDCS.2008.20"},{"issue":"8","key":"9165_CR4","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TPDS.2011.290","volume":"23","author":"B Alomair","year":"2012","unstructured":"Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2012). Scalable RFID systems: A privacy-preserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1536\u20131550.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9165_CR5","doi-asserted-by":"crossref","unstructured":"Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash based RFID protocol. In IEEE Pervasive Computing and Communication Security (PerSec\u201905) (pp. 110\u2013114).","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"9165_CR6","doi-asserted-by":"crossref","unstructured":"Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., & Verbauwhede, I. (2007). Public-key cryptography for RFID-tags. In IEEE International Conference on Pervasive Computing and Communications Workshops (Per\u201907) (pp. 217\u2013222).","DOI":"10.1109\/PERCOMW.2007.98"},{"issue":"6","key":"9165_CR7","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1109\/LCOMM.2011.041411.110283","volume":"15","author":"G Bianchi","year":"2011","unstructured":"Bianchi, G. (2011). Revisiting an RFID identification-free batch authentication approach. IEEE Communication Letters, 15(6), 632\u2013634.","journal-title":"IEEE Communication Letters"},{"key":"9165_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., & Seurin, Y. (2008). Hash functions and RFID tags: Mind the gap. In CHES 2008. LNCS. (pp. 283\u2013299).","DOI":"10.1007\/978-3-540-85053-3_18"},{"issue":"3","key":"9165_CR9","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s10660-011-9078-0","volume":"11","author":"F Buccafurri","year":"2011","unstructured":"Buccafurri, F., & Lax, G. (2011). Implementing disposable credit card numbers by mobile phones. Electronic Commerce Research, 11(3), 271\u2013296.","journal-title":"Electronic Commerce Research"},{"key":"9165_CR10","doi-asserted-by":"crossref","unstructured":"Burmester, M., & Medeiros, B. (2008). The security of EPC Gen2 compliant RFID protocols. In International Conference on Applied Cryptography and Network Security (ACNS\u201908) (pp. 490\u2013506).","DOI":"10.1007\/978-3-540-68914-0_30"},{"issue":"1","key":"9165_CR11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T Cao","year":"2009","unstructured":"Cao, T., Bertino, E., & Lei, H. (2009). Security analysis of the SASI protocol. IEEE Transactions on Dependable and Secure Computing, 6(1), 73\u201377.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"9165_CR12","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/JCN.2012.6184545","volume":"14","author":"JH Cheon","year":"2012","unstructured":"Cheon, J. H., Hong, J., & Tsudik, G. (2012). Reducing RFID reader load with the meet-in-the-middle strategy. Journal of Communications and Networks, 14(1), 10\u201314.","journal-title":"Journal of Communications and Networks"},{"issue":"12","key":"9165_CR13","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1016\/j.comnet.2008.04.016","volume":"51","author":"Y Chen","year":"2008","unstructured":"Chen, Y., Chou, J. S., & Sun, H. M. (2008). A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks, 51(12), 2373\u20132380.","journal-title":"Computer Networks"},{"issue":"4","key":"9165_CR14","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337\u2013340.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"9165_CR15","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"9","author":"HY Chien","year":"2007","unstructured":"Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces, 9(2), 254\u2013259.","journal-title":"Computer Standards & Interfaces"},{"key":"9165_CR16","unstructured":"Chou, J. S., Chen, Y., Wu, C. L., & Lin, C. F. (2011). An efficient RFID mutual authentication scheme based on ECC. Cryptology ePrint Archive: Report 2011\/418."},{"issue":"4","key":"9165_CR17","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TDSC.2010.75","volume":"8","author":"P D\u2019Arco","year":"2011","unstructured":"D\u2019Arco, P., & Santis, A. D. (2011). On ultralightweight RFID authentication protocols. IEEE Transactions on Dependable and Secure Computing, 8(4), 548\u2013563.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9165_CR18","doi-asserted-by":"crossref","unstructured":"Deng, R.H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework for RFID privacy. Computer Security\u2014ESORICS, LNCS# 6345 (pp. 1\u201318).","DOI":"10.1007\/978-3-642-15497-3_1"},{"issue":"3\u20134","key":"9165_CR19","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s10660-010-9062-0","volume":"10","author":"M Eurich","year":"2010","unstructured":"Eurich, M., Oertel, N., & Boutellier, R. (2010). The impact of perceived privacy risks on organizations\u2019 willingness to share item-level event data across the supply chain. Electronic Commerce Research, 10(3\u20134), 423\u2013440.","journal-title":"Electronic Commerce Research"},{"key":"9165_CR20","unstructured":"Fan, J., Batina, L., & Verbauwhede, I. (2009). Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In International conference for Internet Technology and Secured Transactions (pp. 1\u20136)."},{"key":"9165_CR21","unstructured":"F\u00fcrbass, F. (2006). ECC signature generation device for RFID tags."},{"key":"9165_CR22","doi-asserted-by":"crossref","unstructured":"F\u00fcrbass, F. & Wolkerstorfer, J. (2007). ECC processor with low die size for RFID applications. In IEEE International Symposium on Circuit and Systems (ISCAS\u201907) (pp. 1835\u20131838).","DOI":"10.1109\/ISCAS.2007.378271"},{"key":"9165_CR23","doi-asserted-by":"crossref","unstructured":"Girault, M. (1991). Self-certified public keys. In Eurocrypt \u201891, LNCS# 547 (pp. 490\u2013497).","DOI":"10.1007\/3-540-46416-6_42"},{"key":"9165_CR24","doi-asserted-by":"crossref","unstructured":"Godor, G., Giczi, N., & Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In IEEE International Symposium on Wireless Pervasive Computing (ISWPC) (pp. 331\u2013336).","DOI":"10.1109\/WCINS.2010.5541860"},{"key":"9165_CR25","doi-asserted-by":"crossref","unstructured":"Habibi, M. H., Aref, M. R., & Ma, D. (2011). Addressing flaws in RFID authentication protocols. In INDOCRYPT 2011, LNCS#7107, (pp. 216\u2013235).","DOI":"10.1007\/978-3-642-25578-6_17"},{"issue":"4","key":"9165_CR26","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.csi.2008.06.006","volume":"31","author":"D Han","year":"2009","unstructured":"Han, D., & Kwon, D. (2009). Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces, 31(4), 648\u2013652.","journal-title":"Computer Standards & Interfaces"},{"issue":"12","key":"9165_CR27","doi-asserted-by":"crossref","first-page":"4784","DOI":"10.1109\/TIE.2011.2178215","volume":"59","author":"YJ Huang","year":"2012","unstructured":"Huang, Y. J., Lin, W. C., & Li, H. L. (2012). Efficient implementation of RFID mutual authentication protocol. IEEE Transactions on Industrial Electronics, 59(12), 4784\u20134791.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"2","key":"9165_CR28","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s10660-010-9052-2","volume":"10","author":"JT Isaac","year":"2010","unstructured":"Isaac, J. T., Zeadally, S., & Sierra, J. C. (2010). Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electronic Commerce Research, 10(2), 209\u2013233.","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"9165_CR29","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10660-011-9086-0","volume":"12","author":"JT Isaac","year":"2012","unstructured":"Isaac, J. T., Zeadally, S., & Sierra, J. C. (2012). A lightweight secure mobile payment protocol for vehicular ad-hoc networks (VNETs). Electronic Commerce Research, 12(1), 97\u2013123.","journal-title":"Electronic Commerce Research"},{"key":"9165_CR30","doi-asserted-by":"crossref","unstructured":"Jeng, A. B., & Chen, L. Y. (2009). How to enhance the security of E-passport. In Proceedings of International Conference on Machine Learning and Cybernetics (pp. 2922\u20132926).","DOI":"10.1109\/ICMLC.2009.5212583"},{"key":"9165_CR31","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., & Wagner, D. (2005). Security and privacy issues in E-passports. In IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (pp. 1\u201312).","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"9165_CR32","unstructured":"Juels, A., & Weis, S. (2006). Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006\/137."},{"issue":"3","key":"9165_CR33","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/LCOMM.2010.03.092058","volume":"14","author":"G Kapoor","year":"2010","unstructured":"Kapoor, G., & Piramuthu, S. (2010). Vulnerabilities in some recently proposed RFID ownership transfer protocols. IEEE Communication Letters, 14(3), 260\u2013262.","journal-title":"IEEE Communication Letters"},{"issue":"2","key":"9165_CR34","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/TSMCC.2010.2091501","volume":"42","author":"G Kapoor","year":"2012","unstructured":"Kapoor, G., & Piramuthu, S. (2012). Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics-Part C, 42(2), 164\u2013173.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part C"},{"issue":"1","key":"9165_CR35","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.adhoc.2007.12.004","volume":"7","author":"SV Kaya","year":"2009","unstructured":"Kaya, S. V., Savas, E., Levi, A., & Ercetin, O. (2009). Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks, 7(1), 136\u2013151.","journal-title":"Ad Hoc Networks"},{"key":"9165_CR36","doi-asserted-by":"crossref","unstructured":"Kim, H. W., Lim, S. Y., & Lee, H. J. (2006). Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In International Conference on hybrid information technology (ICHIT\u201906) (pp. 718\u2013723).","DOI":"10.1109\/ICHIT.2006.253688"},{"key":"9165_CR37","unstructured":"Kinoshita, S., Ohkubo, M., Hoshino, F., Morohashi, G., Shionoiri, O., & Kanai, A. (2005). Privacy enhanced active RFID tag. Proceedings of Environments: International Workshop on Exploiting Context Histories in Smart (pp. 1\u20135)."},{"key":"9165_CR38","unstructured":"Ko, W. T., Chiou, S. V., Lu, E. H., & Chang, H. K. (2011). An improvement of privacy-preserving ECC-based grouping proof for RFID. In Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (pp. 1062\u20131064)."},{"key":"9165_CR39","unstructured":"Kumar, S. & Paar, C. (2006). Are standards compliant elliptic curve cryptosystems feasible on RFID? In Workshop on RFID Security (pp. 1\u201319)."},{"key":"9165_CR40","doi-asserted-by":"crossref","unstructured":"Lee, Y. K., & Batina, L. (2010). Low-cost untraceable authentication protocols for RFID. In ACM conference on Wireless Network Security (WiSec\u201910) (pp. 55\u201364).","DOI":"10.1145\/1741866.1741877"},{"key":"9165_CR41","doi-asserted-by":"crossref","unstructured":"Lee, Y. K., Batina, L., Singelee, D., Preneel, B., & Verbauwhede, I. (2010). Anti-counterfeiting untraceability and other security challenges for RFID systems\u2014Public-key-based protocols and hardware. Information security and cryptography, Part 5 (pp. 237\u2013257).","DOI":"10.1007\/978-3-642-14452-3_11"},{"key":"9165_CR42","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP Based Randomized Access Control): Provably secure RFID authentication protocol. In IEEE International Conference on RFID (pp. 97\u2013104).","DOI":"10.1109\/RFID.2008.4519370"},{"key":"9165_CR43","unstructured":"Lee, Y. K., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In IEEE International Conference on RFID (pp. 178\u2013185)."},{"issue":"2","key":"9165_CR44","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/JSYST.2007.909820","volume":"1","author":"MO Lehtonen","year":"2007","unstructured":"Lehtonen, M. O., Michahelles, F. M., & Fleisch, E. F. (2007). Trust and security in RFID-based product authentication systems. IEEE System Journal, 1(2), 129\u2013144.","journal-title":"IEEE System Journal"},{"key":"9165_CR45","doi-asserted-by":"crossref","unstructured":"Lim, C. H., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. In ICICS\u201906, LNCS#4307 (pp. 1\u201320).","DOI":"10.1007\/11935308_1"},{"issue":"12","key":"9165_CR46","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/JSEN.2011.2160052","volume":"11","author":"H Liu","year":"2011","unstructured":"Liu, H., & Ning, H. (2011). Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors Journal, 11(12), 3235\u20133245.","journal-title":"IEEE Sensors Journal"},{"issue":"7","key":"9165_CR47","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","volume":"24","author":"H Liu","year":"2012","unstructured":"Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., & Yang, L. T. (2012). Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1321\u20131330.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9165_CR48","unstructured":"Luo, P., Wang, X., Feng, J., & Xu, Y. (2008). Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In International conference on solid-state and integrated-circuit technology (pp. 1681\u20131684)."},{"issue":"2","key":"9165_CR49","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2012.43","volume":"10","author":"D Maimut","year":"2012","unstructured":"Maimut, D., & Ouai, K. (2012). Lightweight cryptography for RFID tags. IEEE Security & Privacy, 10(2), 76\u201379.","journal-title":"IEEE Security & Privacy"},{"key":"9165_CR50","volume-title":"Modern cryptography\u2014Theory and practice","author":"W Mao","year":"2003","unstructured":"Mao, W. (2003). Modern cryptography\u2014Theory and practice. New Jersey: Prentice Hall."},{"key":"9165_CR51","unstructured":"Nathan, B. T., Meenakumari, R., & Usha, S. (2011). Formation of elliptic curve using finger print for network security. In International Conference on Process Automation, Control and Computing (PACC) (pp. 1\u20135)."},{"issue":"12","key":"9165_CR52","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1049\/iet-com.2010.0625","volume":"5","author":"H Ning","year":"2011","unstructured":"Ning, H., Liu, H., Mao, J., & Zhang, Y. (2011). Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications, 5(12), 1755\u20131768.","journal-title":"IET Communications"},{"issue":"1","key":"9165_CR53","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1049\/iet-cdt.2008.0165","volume":"4","author":"M O\u2019Neill","year":"2010","unstructured":"O\u2019Neill, M., & Robshaw, M. J. B. (2010). Low-cost digital signature architecture suitable for radio frequency identification tags. IET Computers & Digital Techniques, 4(1), 14\u201326.","journal-title":"IET Computers & Digital Techniques"},{"key":"9165_CR54","doi-asserted-by":"crossref","unstructured":"Ouafi, K., & Phan, R. C.-W. (2008). Traceable privacy of recent provably-secure RFID protocols. In International Conference Applied Cryptography and Network Security (ACNS), LNCS#5037 (pp. 479\u2013489).","DOI":"10.1007\/978-3-540-68914-0_29"},{"key":"9165_CR55","doi-asserted-by":"crossref","unstructured":"Oyarhossein, S., & Mohammadi, S. (2009). Cryptography and authentication processing framework on RFID active tags for carpet products. In International Conference on Communications Technology and Applications, (ICCTA\u201909) (pp. 26\u201331).","DOI":"10.1109\/ICCOMTA.2009.5349244"},{"issue":"3","key":"9165_CR56","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MPRV.2011.42","volume":"11","author":"R Peeters","year":"2012","unstructured":"Peeters, R., Singel\u00e9e, D., & Preneel, B. (2012). Toward more secure and reliable access control. Pervasive Computing, 11(3), 76\u201383.","journal-title":"Pervasive Computing"},{"key":"9165_CR57","doi-asserted-by":"crossref","unstructured":"Pendl, C., Pelnar, M., & Hutter, M. (2012). Elliptic curve cryptography on the WISP UHF RFID tag. RFID Security and Privacy, LNCS#7055 (pp. 32\u201347).","DOI":"10.1007\/978-3-642-25286-0_3"},{"key":"9165_CR58","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., & Ribagorda, A. (2009). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. Information Security Applications, LNCE#5379 (pp. 56\u201368).","DOI":"10.1007\/978-3-642-00306-6_5"},{"issue":"4","key":"9165_CR59","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RC-W Phan","year":"2009","unstructured":"Phan, R. C.-W. (2009). Cryptanalysis of a new ultralightweight RFID authentication protocol\u2014SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316\u2013320.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"9165_CR60","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1109\/TSMCC.2007.913918","volume":"38","author":"S Piramuthu","year":"2008","unstructured":"Piramuthu, S. (2008). Lightweight cryptographic authentication in passive RFID-tagged systems. IEEE Transactions on Systems, Man, and Cybernetics-Part C, 38(3), 360\u2013376.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part C"},{"issue":"2","key":"9165_CR61","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.dss.2010.09.005","volume":"50","author":"S Piramuthu","year":"2011","unstructured":"Piramuthu, S. (2011). RFID mutual authentication protocols. Decision Support Systems, 50(2), 387\u2013393.","journal-title":"Decision Support Systems"},{"key":"9165_CR62","doi-asserted-by":"crossref","unstructured":"Poupard, G., & Stern, J. (1998). Security analysis of a practical \u2018On the Fly\u2019 authentication and signature generation. In Eurocrypt\u201998, LNCS#1403 (pp. 422\u2013436).","DOI":"10.1007\/BFb0054143"},{"issue":"1\u20132","key":"9165_CR63","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1023\/B:ELEC.0000009283.82564.25","volume":"4","author":"M Rennhard","year":"2004","unstructured":"Rennhard, M., Rafeli, S., Mathy, L., Plattner, B., & Hutxhison, D. (2004). Towards pseudonymous e-commerce. Electronic Commerce Research, 4(1\u20132), 83\u2013111.","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"9165_CR64","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/LCOMM.2009.082117","volume":"13","author":"P Rizomiliotis","year":"2009","unstructured":"Rizomiliotis, P., Rekleitis, E., & Gritzalis, S. (2009). Security analysis of the Song\u2013Mitchell authentication protocol for low-cost RFID tags. IEEE Communication Letters, 13(4), 274\u2013276.","journal-title":"IEEE Communication Letters"},{"key":"9165_CR65","unstructured":"Roberti, M. (2007). A 5-cent breakthrougha. In International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT\u201907)."},{"key":"9165_CR66","doi-asserted-by":"crossref","unstructured":"Sadeghi, A. R., Visconti, I., & Wachsmann, C. (2010). Enhancing RFID security and privacy by physically unclonable functions. Information security and cryptography, Part 5 (pp. 281\u2013305).","DOI":"10.1007\/978-3-642-14452-3_13"},{"key":"9165_CR67","doi-asserted-by":"crossref","unstructured":"Seo, Y., Lee, H., & Kim, K. (2006). A scalable and untraceable authentication protocol for RFID. In International Conference on Emerging Directions in Embedded and Ubiquitous Computing (EUC\u201906) (pp. 252\u2013261).","DOI":"10.1007\/11807964_26"},{"issue":"12","key":"9165_CR68","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/LCOMM.2011.103111.111816","volume":"15","author":"B Song","year":"2011","unstructured":"Song, B., Hwang, J. Y., & Shim, K. A. (2011). Security improvement of an RFID security protocol of ISO\/IEC WD 29167\u20136. IEEE Communication Letters, 15(12), 1375\u20131377.","journal-title":"IEEE Communication Letters"},{"issue":"1","key":"9165_CR69","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(1), 556\u2013566.","journal-title":"Computer Communications"},{"key":"9165_CR70","volume-title":"Cryptography\u2014Theory and practice","author":"DR Stinson","year":"1995","unstructured":"Stinson, D. R. (1995). Cryptography\u2014Theory and practice. Boca Raton: CRC Press Inc."},{"issue":"8","key":"9165_CR71","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1109\/TMC.2008.175","volume":"8","author":"HM Sun","year":"2009","unstructured":"Sun, H. M., & Ting, W. C. (2009). A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 8(8), 1052\u20131062.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"9165_CR72","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"HM Sun","year":"2011","unstructured":"Sun, H. M., Ting, W. C., & Wang, K. H. (2011). On the security of Chien\u2019s ultralightweight RFID authentication protocol. IEEE Transactions on Dependable and Secure Computing, 8(2), 315\u2013317.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"25","key":"9165_CR73","first-page":"6","volume":"23","author":"D Tagra","year":"2010","unstructured":"Tagra, D., Rahman, M., & Sampalli, S. (2010). Technique for preventing DoS attacks on RFID systems. Software, Telecommunications and Computer Networks, 23(25), 6\u201310.","journal-title":"Software, Telecommunications and Computer Networks"},{"issue":"4","key":"9165_CR74","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","volume":"7","author":"CC Tan","year":"2008","unstructured":"Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7(4), 1400\u20131407.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"9165_CR75","doi-asserted-by":"crossref","first-page":"1882","DOI":"10.1109\/TWC.2010.06.081301","volume":"9","author":"CC Tan","year":"2010","unstructured":"Tan, C. C., Sheng, B., & Li, Q. (2010). Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communications, 9(6), 1882\u20131889.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"9165_CR76","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"6","author":"Y Tian","year":"2012","unstructured":"Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communication Letters, 6(5), 702\u2013705.","journal-title":"IEEE Communication Letters"},{"key":"9165_CR77","doi-asserted-by":"crossref","unstructured":"Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. Topics in cryptology\u2014CT-RSA, LNCE#3850 (pp. 115\u2013131).","DOI":"10.1007\/11605805_8"},{"key":"9165_CR78","doi-asserted-by":"crossref","unstructured":"Vaudenay, S. (2007). On privacy models for RFID. Advances in cryptology, LNCS#4822 (pp. 68\u201387).","DOI":"10.1007\/978-3-540-76900-2_5"},{"issue":"6","key":"9165_CR79","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2007.164","volume":"5","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S. (2007). E-passport threats. IEEE Security and Privacy, 5(6), 61\u201364.","journal-title":"IEEE Security and Privacy"},{"issue":"3","key":"9165_CR80","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1109\/TII.2012.2185245","volume":"8","author":"B Wang","year":"2012","unstructured":"Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics, 8(3), 689\u2013696.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"9165_CR81","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2011.17","volume":"13","author":"CH Wei","year":"2011","unstructured":"Wei, C. H., Hwang, M. S., & Chin, A. Y. (2011). A mutual authentication protocol for RFID. IT Professional, 13(2), 20\u201324.","journal-title":"IT Professional"},{"key":"9165_CR82","unstructured":"Yamada, I., Shiotsu, S., Itasaki, A., Inano, S., Yasaki, K. & Takenaka, M. (2005). Secure active RFID tag system. In International Workshop on UbiComp Privacy (pp. 1\u20135)."},{"key":"9165_CR83","first-page":"6","volume":"1","author":"KH Yeh","year":"2010","unstructured":"Yeh, K. H., & Lo, N. W. (2010). Improvement of two lightweight RFID authentication protocols. Information Assurance and Security Letters, 1, 6\u201311.","journal-title":"Information Assurance and Security Letters"},{"issue":"2","key":"9165_CR84","first-page":"7678","volume":"37","author":"TC Yeh","year":"2010","unstructured":"Yeh, T. C., Wang, Y. J., Kuo, T. C., & Wang, S. S. (2010). Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications, 37(2), 7678\u20137683.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"9165_CR85","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TDSC.2011.30","volume":"9","author":"Y Zuo","year":"2012","unstructured":"Zuo, Y. (2012). Survivability experiment and attack characterization for RFID. IEEE Transactions on Dependable and Secure Computing, 9(2), 289\u2013302.","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-014-9165-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-014-9165-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-014-9165-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T23:12:38Z","timestamp":1565997158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-014-9165-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":85,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9165"],"URL":"https:\/\/doi.org\/10.1007\/s10660-014-9165-0","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,4]]}}}