{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T11:47:57Z","timestamp":1765885677996},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T00:00:00Z","timestamp":1251417600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10796-009-9208-6","type":"journal-article","created":{"date-parts":[[2009,8,27]],"date-time":"2009-08-27T07:02:22Z","timestamp":1251356542000},"page":"507-519","source":"Crossref","is-referenced-by-count":17,"title":["Secure and private search protocols for RFID systems"],"prefix":"10.1007","volume":"12","author":[{"given":"Yanjun","family":"Zuo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,28]]},"reference":[{"key":"9208_CR1","unstructured":"Aho, A., Lam, M, Sethi, R., & Ullman, J. (2007). Compilers: Principles, techniques & tools, 2 nd Edition. Pearson Education, Inc."},{"key":"9208_CR2","unstructured":"Avoine, G. (2005). Cryptography in radio frequency identification and fair exchange protocols. PhD thesis, Ecole Polytechnique Federale de Lausanne."},{"key":"9208_CR3","unstructured":"Avoine, G. (2006). Security and privacy in RFID systems. http:\/\/lasecwww.epfl.ch\/~gavoine\/rfid."},{"key":"9208_CR4","unstructured":"Burmester, M., & Medeiros, B. (2007). RFID security: Attacks, countermeasures and challenges. 5th RFID Academic Convocation. The RFID Journal Conference, April 30 - May 2, Orlando, USA."},{"key":"9208_CR5","doi-asserted-by":"crossref","unstructured":"Burmester, M., Medeiros, B., & Motta, R. (2008). Provably secure grouping-proofs for RFID tags. Proceedings of 8th Smart Card Research and Advanced Application Conference, September 8-11, Ehgam, UK.","DOI":"10.1007\/978-3-540-85893-5_13"},{"key":"9208_CR6","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Holczer, T., & Vajda, I. (2006). Optimal key-trees for tree-based private authentication. In Danezis G. & Golle P. (Eds.), Privacy enhancing technologies. Springer, LNCS 4258, pp. 332-350.","DOI":"10.1007\/11957454_19"},{"key":"9208_CR7","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., & Avoine, G. (2006). Noisy Tags: A pretty good key exchange protocol for RFID tags. Proceedings of 7th IFIP WG 8.8\/11.2 International Conference on Smart Card Research and Advanced Applications, April 19-21, Tarragona, Spain.","DOI":"10.1007\/11733447_21"},{"key":"9208_CR8","doi-asserted-by":"crossref","unstructured":"Garfinkel, S., Juels, A., & Pappu, R. (2005). RFID Privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, pp. 34-43.","DOI":"10.1109\/MSP.2005.78"},{"key":"9208_CR9","unstructured":"Glover, B., & Bhatt, H. (2006). RFID essentials. O\u2019Reilly Publisher."},{"key":"9208_CR10","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., & Yahalom, R. (1990). Reasoning about belief in cryptographic protocols. Proceedings of IEEE Symposium on Security and Privacy, May 1990, Oakland, California, USA.","DOI":"10.1109\/RISP.1990.63854"},{"key":"9208_CR11","doi-asserted-by":"crossref","unstructured":"Hopper, N., & Blum, M. (2001). Secure human identification protocols. In C. Boyd (Ed.), Advances in cryptology \u2013 ASIA CRYPT 2001, Vol. 2248, Lecture notes in computer science, pp. 52-66, Springer-Verlag.","DOI":"10.1007\/3-540-45682-1_4"},{"key":"9208_CR12","unstructured":"Juels, A. (2004). Minimalist cryptography for low-cost RFID tags. Proceedings of Fourth Conference on Security in Communication Networks, pp. 149-153, September 8-10, Amalfi, Italy."},{"key":"9208_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24(2), February 2006.","DOI":"10.1109\/JSAC.2005.861395"},{"key":"9208_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In V. Shoup (Ed.), Advances in cryptology \u2013 crypto 05, Lecture notes in computer science. Springer-Verlag.","DOI":"10.1007\/11535218_18"},{"key":"9208_CR15","doi-asserted-by":"crossref","unstructured":"Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications, March 19-23, White Plains, USA.","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"9208_CR16","doi-asserted-by":"crossref","unstructured":"Katz, J., & Shin, J. (2006). Parallel and concurrent security of the HB and HB++ protocols. In Advances in cryptology \u2013 EURO CRYPT 2006, Vol. 4004, Lecture notes in computer science, pp. 73-87, Springer.","DOI":"10.1007\/11761679_6"},{"key":"9208_CR17","doi-asserted-by":"crossref","unstructured":"Lim, C., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. Proceedings of the 8th Conference on Information and Communications security, December 4-7, Raleigh, NC, USA.","DOI":"10.1007\/11935308_1"},{"key":"9208_CR18","doi-asserted-by":"crossref","unstructured":"Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. Proceedings of the ACM Conference on Computer and Communications Security, Washington DC, USA.","DOI":"10.1145\/1030083.1030112"},{"key":"9208_CR19","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., & Trappe, W. (2004). Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2 nd ACM Workshop on Security of Ad hoc and Sensor Networks, October 25, Washington DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"9208_CR20","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, C., Estevez-Tapiador, J., & Ribagorda, A. (2006a). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Proceedings of 2 nd Workshop on RFID Security, July 12-14, Graz, Austria.","DOI":"10.1007\/11833529_93"},{"key":"9208_CR21","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, C., Estevez-Tapiador, J., & Ribagorda, A. (2006b). M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. Proceedings of International Conference on Ubiquitous Intelligence and Computing, pp. 912-923, September 3-6, Wuhan, China.","DOI":"10.1007\/11833529_93"},{"key":"9208_CR22","doi-asserted-by":"crossref","unstructured":"Song, B., & Mitchell, C. (2008). RFID Authentication protocol for low-cost tags. Proceedings of first ACM Conference on Wireless Network Security, March 31-April 2, 2008, Alexandria, Virginia, USA.","DOI":"10.1145\/1352533.1352556"},{"key":"9208_CR23","unstructured":"Swedberg, C. (2008). GE Develops passive tag that functions as multiple sensors. Journal of RFID."},{"key":"9208_CR24","doi-asserted-by":"crossref","unstructured":"Tan, C., Sheng, B., & Li, Q. (2007). Secure and serverless RFID authentication and search protocols. Proceedings of International Conference on Pervasive Computing and Communications, March 2007, New York, USA.","DOI":"10.1109\/PERCOM.2007.30"},{"key":"9208_CR25","unstructured":"Tsudik, G. (2006). YA-TRAP:Yet another trivial RFID authentication protocol. Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications, March 13-17, Pisa, Italy."},{"key":"9208_CR26","unstructured":"Vajda, I., & Buttyan L. (2003). Lightweight authentication protocols for low-cost RFID tags. Proceedings of Second Workshop on Security in Ubiquitous Computing, October 12, Seattle, Washington, USA."},{"key":"9208_CR27","unstructured":"Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. Proceedings of the 1 st International Conference on Security in Pervasive Computing, March 12-14, Boppard, Germany."},{"key":"9208_CR28","unstructured":"Xi, Y., Schwiebert, L., & Shi, W. (2006). Preserving source location privacy in monitoring-based wireless sensor networks. Proceedings of 20th International Parallel and Distributed Processing Symposium, April 25-29, Rhodes Island, Greece."},{"key":"9208_CR29","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual authentication protocol for low-cost RFID. Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 14-15, Graz, Austria."},{"key":"9208_CR30","unstructured":"Yuksel, K. (2004). Universal hashing for ultra-low-power cryptographic hardware applications. Master\u2019s Thesis, Worcester Polytechnic Institute, USA."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9208-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9208-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9208-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:48:37Z","timestamp":1685108917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9208-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,28]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["9208"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9208-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,28]]}}}