{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:02:51Z","timestamp":1775275371676,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T00:00:00Z","timestamp":1542585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Photon Netw Commun"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11107-018-0812-6","type":"journal-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T05:44:18Z","timestamp":1542606258000},"page":"204-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9158-9524","authenticated-orcid":false,"given":"Yang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jinsha","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,19]]},"reference":[{"issue":"C","key":"812_CR1","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A.: Security, Privacy and Trust in the Internet of Things. Int. J. Comput. Telecommun. Netw. 76(C), 146\u2013164 (2015)","journal-title":"Int. J. Comput. Telecommun. Netw."},{"issue":"2","key":"812_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"812_CR3","first-page":"1101","volume":"44","author":"JG Li","year":"2016","unstructured":"Li, J.G., Zhang, Y.C., Wei, X.X.: A provably secure certificate-based broadcast encryption scheme. Acta Electron. Sin. 44(5), 1101\u20131110 (2016)","journal-title":"Acta Electron. Sin."},{"issue":"5","key":"812_CR4","first-page":"905","volume":"17","author":"WD Fang","year":"2016","unstructured":"Fang, W.D., Shan, L.H., Jia, G.Q.: A low complexity secure network coding in wireless sensor network. J. Internet Technol. 17(5), 905\u2013913 (2016)","journal-title":"J. Internet Technol."},{"issue":"6","key":"812_CR5","first-page":"27","volume":"2016","author":"U Mujahid","year":"2016","unstructured":"Mujahid, U.: A new ultralight weight RFID mutual authentication protocol: SASI using recursive Hash. Int. J. Distrib. Sens. Netw. 2016(6), 27 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"812_CR6","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Tapiador J.M.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of Workshop on RFID Security, vol. 2006, No, 10, pp. 6 (2006)","DOI":"10.1007\/11915034_59"},{"key":"812_CR7","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, JC.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, pp. 352\u2013361. Montpellier (2006)","DOI":"10.1007\/11915034_59"},{"issue":"3","key":"812_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.cam.2013.09.073","volume":"259","author":"M Safkhani","year":"2014","unstructured":"Safkhani, M., Peris-Lopez, P.: Cryptanalysis of the Cho et al. protocol: a Hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259(3), 571\u2013577 (2014)","journal-title":"J. Comput. Appl. Math."},{"issue":"5","key":"812_CR9","first-page":"456","volume":"1","author":"JS Yuan","year":"2014","unstructured":"Yuan, J.S., Xu, Y.: Mutual authentication protocol for RFID based on asymmetric keys and Hash function. J. Cryptol. Res. 1(5), 456\u2013464 (2014)","journal-title":"J. Cryptol. Res."},{"issue":"4","key":"812_CR10","first-page":"121","volume":"27","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Zheng, Y.: An enhanced ID-updating Hash-based RFID authentication protocol with strong privacy protection. Front. Artif. Intell. Appl. 27(4), 121\u2013129 (2015)","journal-title":"Front. Artif. Intell. Appl."},{"issue":"3\u20134","key":"812_CR11","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s00521-012-1283-9","volume":"24","author":"N Bagheri","year":"2014","unstructured":"Bagheri, N., Safkhani, M., Naderi, M.: Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3\u20134), 799\u2013805 (2014)","journal-title":"Neural Comput. Appl."},{"issue":"21","key":"812_CR12","doi-asserted-by":"publisher","first-page":"22761","DOI":"10.1007\/s11042-017-4386-6","volume":"76","author":"J Shen","year":"2017","unstructured":"Shen, J., Tan, H., Zhang, Y., Sun, X., Xiang, Y.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimed. Tools Appl. 76(21), 22761\u201322783 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"812_CR13","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/10798587.2014.888243","volume":"20","author":"C-L Chen","year":"2014","unstructured":"Chen, C.-L., Yang, T.-T., Leu, F.-Y., Huang, Y.-L.: Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 20(3), 365\u2013379 (2014)","journal-title":"Intell. Autom. Soft Comput."},{"key":"812_CR14","doi-asserted-by":"crossref","unstructured":"Hui Feng, H., Yu, P. K.: A privacy and authentication protocol for mobile RFID system. In: IEEE International Symposium on Independent Computing IEEE, pp. 1\u20136. Orlando (2015)","DOI":"10.1109\/INDCOMP.2014.7011754"},{"issue":"6","key":"812_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/S1005-8885(15)60690-2","volume":"22","author":"Z Xiaohong","year":"2015","unstructured":"Xiaohong, Z., Yingmeng, H.: RFID mutual-authentication protocol with synchronous updated-keys based on Hash function. J. China Univ. Posts Telecommun. 22(6), 27\u201335 (2015)","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"1","key":"812_CR16","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1504\/IJSN.2010.030723","volume":"5","author":"Y Ming Hour","year":"2010","unstructured":"Ming Hour, Y.: Lightweight authentication protocol for mobile RFID networks. Int. J. Secur. Netw. 5(1), 53\u201362 (2010)","journal-title":"Int. J. Secur. Netw."},{"issue":"1","key":"812_CR17","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"11","author":"D Robin","year":"2013","unstructured":"Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383\u2013396 (2013)","journal-title":"Ad Hoc Netw."},{"key":"812_CR18","doi-asserted-by":"crossref","unstructured":"Wu, X., Min, Z., Yang, X.: Time-stamp based mutual authentication protocol for mobile RFID system. In: Wireless and Optical Communication Conference IEEE, pp. 702\u2013706. Chongqing (2013)","DOI":"10.1109\/WOCC.2013.6676465"},{"key":"812_CR19","volume-title":"Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. Network and Parallel Computing","author":"EJ Yoon","year":"2012","unstructured":"Yoon, E.J.: Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. Network and Parallel Computing. Springer, Berlin (2012)"},{"key":"812_CR20","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.T.: Authentication mechanism for mobile RFID based smart grid network. In: Electrical and Computer Engineering IEEE. Toronto (2014)","DOI":"10.1109\/CCECE.2014.6901143"},{"issue":"2","key":"812_CR21","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11227-014-1272-0","volume":"70","author":"F Mohammad Sabzinejad","year":"2014","unstructured":"Mohammad Sabzinejad, F.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987\u20131001 (2014)","journal-title":"J. Supercomput."},{"issue":"3","key":"812_CR22","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1007\/s11277-014-1605-6","volume":"77","author":"B Niu","year":"2014","unstructured":"Niu, B., Zhu, X., Chi, H.: Privacy and authentication protocol for mobile RFID systems. Wirel. Pers. Commun. Int. J. 77(3), 1713\u20131731 (2014)","journal-title":"Wirel. Pers. Commun. Int. J."}],"container-title":["Photonic Network Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-018-0812-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11107-018-0812-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-018-0812-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T03:28:34Z","timestamp":1775273314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11107-018-0812-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,19]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["812"],"URL":"https:\/\/doi.org\/10.1007\/s11107-018-0812-6","relation":{},"ISSN":["1387-974X","1572-8188"],"issn-type":[{"value":"1387-974X","type":"print"},{"value":"1572-8188","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,19]]},"assertion":[{"value":"22 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}