{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T11:48:21Z","timestamp":1765885701127},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,8,13]],"date-time":"2009-08-13T00:00:00Z","timestamp":1250121600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10796-009-9216-6","type":"journal-article","created":{"date-parts":[[2009,8,12]],"date-time":"2009-08-12T07:01:51Z","timestamp":1250060511000},"page":"521-528","source":"Crossref","is-referenced-by-count":31,"title":["A lightweight anti-desynchronization RFID authentication protocol"],"prefix":"10.1007","volume":"12","author":[{"given":"Shijie","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zongwei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Edward C.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,13]]},"reference":[{"key":"9216_CR1","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., & Dottax, E. (2006). HB++: a lightweight authentication protocol secure against some attacks. IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing\u2014SecPerU.","DOI":"10.1109\/SECPERU.2006.10"},{"key":"9216_CR2","doi-asserted-by":"crossref","unstructured":"Choi, E. Y., Lee S. M., & Lee, D. H. (2005). Efficient RFID authentication protocol for ubiquitous computing environment. SecUbiq 2005, LNCS 3823, 945-954.","DOI":"10.1007\/11596042_97"},{"issue":"4","key":"9216_CR3","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien, H. Y. (2007). SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337\u2013340.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"9216_CR4","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H Chien","year":"2007","unstructured":"Chien, H., & Chen, C. (2007). Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards &Interfaces, 29(2), 254\u2013259.","journal-title":"Computer Standards &Interfaces"},{"key":"9216_CR5","doi-asserted-by":"crossref","unstructured":"Defend. B., Fu, K., & Juels, A. (2007). Cryptanalysis of two lightweight RFID authentication schemes. Pervasive Computing and Communications Workshops.","DOI":"10.1109\/PERCOMW.2007.34"},{"key":"9216_CR6","doi-asserted-by":"crossref","unstructured":"Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. Securecomm.","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"9216_CR7","unstructured":"Duc, D. N., Park, J., Lee, H. & Kim, K. (2006). Enhancingsecurity of EPCglobal gen-2 RFID tag against traceability and cloning. In Symposium on Cryptography and Information Security\u2014SCIS 2006. Hiroshima, Japan, January 2006."},{"key":"9216_CR8","doi-asserted-by":"crossref","unstructured":"Hancke, G., Kuhn, M. (2005). An RFID distance bounding protocol. Proceeding of the IEEE, Athens, Greece, 2005.","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"9216_CR9","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. The 2nd IEEE Annual Conference on Pervasive Computing and Communication Workshops, Washington, DC, USA.","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"9216_CR10","doi-asserted-by":"crossref","unstructured":"Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. Advances in cryptology\u2014ASIACRYPT 2001, Volume 2248, Lecture Notes in Computer Science (pp. 52\u201366). Springer-Verlag.","DOI":"10.1007\/3-540-45682-1_4"},{"key":"9216_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. Advanced in cryptology\u2014CRYPTO\u201905, Volume 3126, Lecture Notes in Computer Science (pp. 293\u2013308). Springer-Verlag.","DOI":"10.1007\/11535218_18"},{"key":"9216_CR12","unstructured":"Konidala, D. M., Kim, Z., & Kim, K. (2007). A simple and cost-effective RFID tag-reader mutual authentication scheme. International Conference on RFID Security 2007 (pp. 141\u2013152). Malaga, Spain."},{"key":"9216_CR13","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/11807964_27","volume":"4097\/2006","author":"D Kwon","year":"2006","unstructured":"Kwon, D., Han, D., Lee, J., & Yeom, Y. (2006). Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005. Emerging Directions in Embedded and Ubiquitous Computing, 4097\/2006, 262\u2013270.","journal-title":"Emerging Directions in Embedded and Ubiquitous Computing"},{"key":"9216_CR14","unstructured":"Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authenticaiton for low-cost RFID systems. International Conference on Computational Science and Its Applications (ICCSA)."},{"key":"9216_CR15","doi-asserted-by":"crossref","unstructured":"Li, T., & Deng, R. H. (2007). Vulnerability analysis of EMAP\u2014an efficient RFID mutual authentication protocol. The Second International Conference on Availability, Reliability and Security (AReS 2007).","DOI":"10.1109\/ARES.2007.159"},{"key":"9216_CR16","doi-asserted-by":"crossref","unstructured":"Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. IFIP SEC\u00a02007, South Africa.","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"9216_CR17","unstructured":"Piramuthu, S. (2007). HB and related lightweight authentication protocols for secure RFID tag\/reader authentication. Decision and Information Sciences University of Florida (pp. 32611\u20137169). Gainesville, Florida."},{"key":"9216_CR18","doi-asserted-by":"crossref","unstructured":"Peris-Lopez,P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006a). LMAP: A real lightwight mutual authentication protocol for low-cost RFID tags. Proceedings of RFIDSec06 Workshop on RFID Security, Austria.","DOI":"10.1007\/11833529_93"},{"key":"9216_CR19","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006b). EMAP: An efficient mutual authentication protocol for low-cost RFID tags. OTM Federated Conferences and Workshop: IS Workshop.","DOI":"10.1007\/11915034_59"},{"key":"9216_CR20","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006c). Authentication protocol for low-cost RFID. International Conference on Ubiquitous Intelligence and Computing UIC\u201906, LNCS 4159 (pp. 912\u2013923). Springer.","DOI":"10.1007\/11833529_93"},{"key":"9216_CR21","unstructured":"Peris-Lopez, P., Li, T., Lim, T. L. et al. (2008). Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard. RFIDsec\u201908, Budapest, Hungary."},{"key":"9216_CR22","doi-asserted-by":"crossref","unstructured":"Song, B., & Mitchell, C. J. (2008). RFID authentication protocol for low-cost tags. First ACM Conference on Wireless Network Security (pp. 140\u2013147).","DOI":"10.1145\/1352533.1352556"},{"key":"9216_CR23","unstructured":"Vajda, I., & Buttyan, L. (2003). Lightweight authentication protocols for low-cost RFID tags. In Second workshop on security in ubiquitous computing\u2014Ubicomp."},{"key":"9216_CR24","unstructured":"Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. 1st International Conference on Security in Pervasive Computing."},{"key":"9216_CR25","unstructured":"Yksel, K., Kaps, J. P., & Sunar, B. (2004). Universal hash functions for emerging ultralow-power networks. CNDS\u201904."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9216-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9216-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9216-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T09:15:52Z","timestamp":1685092552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9216-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,13]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["9216"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9216-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,13]]}}}