{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:58:50Z","timestamp":1760709530113},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T00:00:00Z","timestamp":1518998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10796-018-9835-x","type":"journal-article","created":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T22:42:56Z","timestamp":1519080176000},"page":"1153-1166","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Group Ownership Delegate Protocol for RFID Systems"],"prefix":"10.1007","volume":"21","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Chun-Ta","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chung-Lun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yan-Ming","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,19]]},"reference":[{"key":"9835_CR1","unstructured":"Alamr, A. A., Kausar, F., Kim, J., & Seo, C. (2016). A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of Supercomputing, 1\u201314."},{"key":"9835_CR2","doi-asserted-by":"crossref","unstructured":"Azimi, Y., & Bagherzadeh, J. (2015). Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID. In Proceedings of 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1\u20136.","DOI":"10.1109\/IKT.2015.7288808"},{"key":"9835_CR3","unstructured":"Bagheri, N., Safkhani, M., & Jannati, H. (2015). Security analysis of Niu et al. authentication and ownership management protocol. IACR Cryptology ePrint Archive, pp. 1-8."},{"key":"9835_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. M. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8, 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"9835_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comnet.2016.05.017","volume":"105","author":"T Cao","year":"2016","unstructured":"Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47\u201359.","journal-title":"Computer Networks"},{"key":"9835_CR6","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1007\/s11277-012-0500-2","volume":"68","author":"C-L Chen","year":"2013","unstructured":"Chen, C.-L., & Chien, C.-F. (2013). An ownership transfer scheme using mobile RFIDs. Wireless Personal Communications, 68, 1093\u20131119.","journal-title":"Wireless Personal Communications"},{"key":"9835_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10660-014-9165-0","volume":"15","author":"Y Chen","year":"2015","unstructured":"Chen, Y., & Chou, J.-S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15, 97\u2013120.","journal-title":"Electronic Commerce Research"},{"key":"9835_CR8","doi-asserted-by":"crossref","unstructured":"Chien, H.-Y. (2015). De-synchronization attack on quadratic residues-based RFID ownership transfer. In Proceedings of 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), Kaohsiung City, Taiwan, pp. 42\u201347.","DOI":"10.1109\/AsiaJCIS.2015.13"},{"key":"9835_CR9","first-page":"94","volume":"21","author":"G Cong","year":"2014","unstructured":"Cong, G., Zhang, Z.-J., Zhu, L.-H., Tan, Y.-A., & Zhen, Y. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21, 94\u2013103.","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"9835_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.adhoc.2015.08.019","volume":"37","author":"T Dimitriou","year":"2016","unstructured":"Dimitriou, T. (2016). Key evolving RFID systems: Forward\/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37, 195\u2013208.","journal-title":"Ad Hoc Networks"},{"key":"9835_CR11","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"11","author":"R Doss","year":"2013","unstructured":"Doss, R., Sundaresan, S., & Zhou, W. (2013a). A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11, 383\u2013396.","journal-title":"Ad Hoc Networks"},{"key":"9835_CR12","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2012.2235834","volume":"8","author":"R Doss","year":"2013","unstructured":"Doss, R., Zhou, W., & Yu, S. (2013b). Secure RFID tag ownership transfer based on quadratic residues. IEEE Transactions on Information Forensics and Security, 8, 390\u2013401.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9835_CR13","doi-asserted-by":"crossref","unstructured":"Edelev, S., Taheri, S., & Hogrefe, D. (2015). A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2. In Proceedings of 2015 I.E. International Conference on RFID Technology and Applications (RFID-TA) Tokyo, Japan, pp. 126\u2013133.","DOI":"10.1109\/RFID-TA.2015.7379806"},{"key":"9835_CR14","unstructured":"Forouzan, B. A., & Mukhopadhyay, D. (2011). Cryptography and network security (sie): McGraw-Hill Education."},{"key":"9835_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of Computing, Bethesda, pp. 169\u2013178.","DOI":"10.1145\/1536414.1536440"},{"key":"9835_CR16","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2010) Toward basing fully homomorphic encryption on worst-case hardness. In Proceedings of Annual Cryptology Conference, Santa Barbara, pp. 116\u2013137.","DOI":"10.1007\/978-3-642-14623-7_7"},{"key":"9835_CR17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28, 270\u2013299.","journal-title":"Journal of Computer and System Sciences"},{"key":"9835_CR18","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/TSMCC.2010.2091501","volume":"42","author":"G Kapoor","year":"2012","unstructured":"Kapoor, G., & Piramuthu, S. (2012). Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42, 164\u2013173.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"9835_CR19","doi-asserted-by":"crossref","unstructured":"Lee, C.-C., Cheng, C.-L., Lai, Y.-M., & Li, C.-T. (2016). Cryptanalysis of Dimitriou's key evolving RFID systems. In Proceedings of the Fifth International Conference on Network, Communication and Computing, Kyoto, pp. 229\u2013233.","DOI":"10.1145\/3033288.3033292"},{"key":"9835_CR20","unstructured":"Li, G., Xu, X., & Li, Q., (2015). LADP: A lightweight authentication and delegation protocol for RFID tags. In Proceedings of 2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN), Sapporo, pp. 860\u2013865."},{"key":"9835_CR21","unstructured":"Li, Z., Zhong, X., Chen, X., & Liu, J. (2016). A lightweight hash-based mutual authentication protocol for RFID. In Proceedings of International Workshop on Management of Information, Processes and Cooperation, Hangzhou, pp. 87\u201398."},{"key":"9835_CR22","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11277-010-0139-9","volume":"63","author":"Y-H Lien","year":"2012","unstructured":"Lien, Y.-H., Hsi, C.-T., Leng, X., Chiu, J.-H., & Chang, H. K.-C. (2012). An RFID based multi-batch supply chain systems. Wireless Personal Communications, 63, 393\u2013413.","journal-title":"Wireless Personal Communications"},{"key":"9835_CR23","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1007\/s10922-014-9329-1","volume":"23","author":"I-C Lin","year":"2015","unstructured":"Lin, I.-C., Hsu, H.-H., & Cheng, C.-Y. (2015). A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management, 23, 978\u2013997.","journal-title":"Journal of Network and Systems Management"},{"key":"9835_CR24","unstructured":"Mujahid, U., Najam-ul-Islam, M., & Sarwar, S. (2016). A new ultralightweight rfid authentication protocol for passive low cost tags: Kmap. Wireless Personal Communications, 1\u201320."},{"key":"9835_CR25","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s11277-013-1011-5","volume":"72","author":"J Munilla","year":"2013","unstructured":"Munilla, J., Guo, F., & Susilo, W. (2013). Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme. Wireless Personal Communications, 72, 245\u2013258.","journal-title":"Wireless Personal Communications"},{"key":"9835_CR26","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.comcom.2016.05.007","volume":"88","author":"J Munilla","year":"2016","unstructured":"Munilla, J., Burmester, M., & Peinado, A. (2016). Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Computer Communications, 88, 84\u201388.","journal-title":"Computer Communications"},{"key":"9835_CR27","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/TMC.2015.2412933","volume":"15","author":"H Niu","year":"2016","unstructured":"Niu, H., Taqieddin, E., & Jagannathan, S. (2016). EPC Gen2v2 RFID standard authentication and ownership management protocol. IEEE Transactions on Mobile Computing, 15, 137\u2013149.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"9835_CR28","unstructured":"Ray, B. R., Abawajy, J., Chowdhury, M., & Alelaiwi, A. A. (2017). Universal and secure object ownership transfer protocol for the internet of things. To appear in Future Generation Computer Systems."},{"key":"9835_CR29","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169\u2013180.","journal-title":"Foundations of Secure Computation"},{"key":"9835_CR30","unstructured":"K. H. Rosen, (1993) Elementary number theory and its applications: Addison-Wesley."},{"key":"9835_CR31","unstructured":"Shen, H., Shen, J., Khan, M. K., & Lee, J.-H. (2016). Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wireless Personal Communications, 1\u201314."},{"key":"9835_CR32","doi-asserted-by":"crossref","unstructured":"Shen, J., Tan, H., Zhang, Y., Sun, X., & Xiang, Y. (2017). A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 76, 22761\u201322783.","DOI":"10.1007\/s11042-017-4386-6"},{"key":"9835_CR33","first-page":"83","volume":"14","author":"C Su","year":"2017","unstructured":"Su, C., Santoso, B., Li, Y., Deng, R., & Huang, X. (2017). Universally composable RFID mutual authentication. IEEE Transactions on Dependable and Secure Computing, 14, 83\u201394.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9835_CR34","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.comcom.2014.08.015","volume":"55","author":"S Sundaresan","year":"2015","unstructured":"Sundaresan, S., Doss, R., Zhou, W., & Piramuthu, S. (2015). Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Computer Communications, 55, 112\u2013124.","journal-title":"Computer Communications"},{"key":"9835_CR35","doi-asserted-by":"crossref","unstructured":"Surekha, B., Narayana, K. L., Jayaprakash, P., & Vorugunti, C. S. (2016). A realistic lightweight authentication protocol for securing cloud based RFID system. In Proceedings of 2016 I.E. International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, 54\u201360.","DOI":"10.1109\/CCEM.2016.018"},{"key":"9835_CR36","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari, A., & Gupta, B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73, 1085\u20131102.","journal-title":"The Journal of Supercomputing"},{"key":"9835_CR37","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.elerap.2012.01.004","volume":"11","author":"MH Yang","year":"2012","unstructured":"Yang, M. H. (2012). Secure multiple group ownership transfer protocol for mobile RFID. Electronic Commerce Research and Applications, 11, 361\u2013373.","journal-title":"Electronic Commerce Research and Applications"},{"key":"9835_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhu, L., Xu, C., & Yi, Y. (2015). An efficient and secure RFID batch authentication protocol with group tags ownership transfer. In Proceedings of 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, pp. 168\u2013175.","DOI":"10.1109\/CIC.2015.15"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-018-9835-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-018-9835-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-018-9835-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T10:36:13Z","timestamp":1568198173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-018-9835-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,19]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9835"],"URL":"https:\/\/doi.org\/10.1007\/s10796-018-9835-x","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,19]]},"assertion":[{"value":"19 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}