{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:20:06Z","timestamp":1761895206522},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T00:00:00Z","timestamp":1291766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0497-9","type":"journal-article","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T10:51:19Z","timestamp":1291719079000},"page":"664-684","source":"Crossref","is-referenced-by-count":5,"title":["A holistic approach examining RFID design for security and privacy"],"prefix":"10.1007","volume":"64","author":[{"given":"Tim","family":"Good","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Benaissa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,8]]},"reference":[{"key":"497_CR1","doi-asserted-by":"crossref","unstructured":"Phillips T, Karygiannis T, Kuhn R (2005) Security standards for the RFID market. IEEE Comput Soc, Sec Privacy, pp\u00a085\u201389, 1540\u20137993\/05","DOI":"10.1109\/MSP.2005.157"},{"key":"497_CR2","unstructured":"EPCglobal Inc, available at www.epcglobalinc.org"},{"key":"497_CR3","unstructured":"The RFID Journal, available at www.rfidjournal.com"},{"key":"497_CR4","series-title":"LNCS","first-page":"125","volume-title":"Proc security protocols workshop, New York","author":"RJ Anderson","year":"1997","unstructured":"Anderson RJ, Kuhn MG (1997) Attacks on tamper resistant devices. In: Proc security protocols workshop, New York. LNCS, vol\u00a01361. Springer, Berlin, pp\u00a0125\u2013136"},{"key":"497_CR5","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10551-005-2928-8","volume":"59","author":"AR Peslak","year":"2005","unstructured":"Peslak AR (2005) An ethical exploration of privacy and radio frequency identification. J\u00a0Bus Ethics 59:327\u2013345","journal-title":"J\u00a0Bus Ethics"},{"key":"497_CR6","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s10676-006-0014-2","volume":"7","author":"V Lockton","year":"2006","unstructured":"Lockton V, Rosenberg RS (2006) RFID: The next serious threat to privacy. Ethics Inf Technol 7:221\u2013231","journal-title":"Ethics Inf Technol"},{"key":"497_CR7","doi-asserted-by":"crossref","unstructured":"Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur Priv, May\/June","DOI":"10.1109\/MSP.2005.78"},{"issue":"2","key":"497_CR8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381\u2013394, invited paper, Feb","journal-title":"IEEE J Sel Areas Commun"},{"key":"497_CR9","unstructured":"Article-29 Data Protection Working Party (2005) Working document on data protection issues related to RFID technology. WP 105, European Commission, Internal Market Directorate-General, Office No C100-6\/136, Jan 2005"},{"key":"497_CR10","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in pervasive computing 2003","author":"SA Weis","year":"2004","unstructured":"Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing 2003. LNCS, vol\u00a02802. Springer, Berlin, pp\u00a0201\u2013212"},{"issue":"9","key":"497_CR11","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1081992.1082022","volume":"48","author":"M Ohkubo","year":"2005","unstructured":"Ohkubo M, Suzuki K, Kinoshita S (2005) RFID privacy issues and technical challenges. Commun ACM 48(9):66\u201371","journal-title":"Commun ACM"},{"key":"497_CR12","unstructured":"Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) website: www.nocards.org (2003)"},{"key":"497_CR13","unstructured":"Lehtonen M, Staake T, Michahelles F, Fleisch E (2006) From identification to authentication\u2014a review of RFID product authentication techniques. RFIDsec06, Graz Austria, July 2006"},{"key":"497_CR14","volume-title":"Conf on Privacy, Security and Trust (PST)","author":"S Engberg","year":"2004","unstructured":"Engberg S, Harning M, Jensen C (2004) Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience. In: Conf on Privacy, Security and Trust (PST), New Brunswick, Canada, Oct 2004"},{"key":"497_CR15","unstructured":"Chatmon C, Le TV, Burmester M (2006) Secure anonymous RFID authentication protocols. Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA"},{"key":"497_CR16","unstructured":"Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attacks. In: IEEE SecureComm05, Sept. 5\u20139, Athens, Greece"},{"key":"497_CR17","volume-title":"ECRYPT workshop on RFID and lightweight Crypto","author":"J Yang","year":"2005","unstructured":"Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. In: ECRYPT workshop on RFID and lightweight Crypto, Graz, Austria, July 14\u201315"},{"key":"497_CR18","volume-title":"IEEE intl conf on pervasive computing and communications (PerCom06)","author":"G Tsudik","year":"2006","unstructured":"Tsudik G (2006) YA-TRAP: yet another trivial RFID authentication protocol. In: IEEE intl conf on pervasive computing and communications (PerCom06), Pisa, Italy, March 2006"},{"key":"497_CR19","unstructured":"Kfir Z, Wool A (2005) Picking virtual pockets using relay attacks on contactless smartcard systems. Available at http:\/\/eprint.iacr.org\/2005\/052"},{"key":"497_CR20","isbn-type":"print","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/RFIDEURASIA.2007.4368097","volume-title":"1st annual RFID Eurasia conf","author":"ASW Man","year":"2007","unstructured":"Man ASW, Zhang ES, Lau VKN, Tsui CY, Luong HC (2007) Low power VLSI design for a RFID passive tag baseband system enhanced with an AES cryptography engine. In: 1st annual RFID Eurasia conf, 5\u20136 Sept 2007, pp\u00a01\u20136. ISBN: 978-975-01566-0-1","ISBN":"http:\/\/id.crossref.org\/isbn\/9789750156601"},{"key":"497_CR21","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1090\/S0025-5718-1965-0184406-1","volume":"19","author":"RC Tausworthe","year":"1965","unstructured":"Tausworthe RC (1965) Random numbers generated by linear recurrence modulo two. Math Comput 19:201\u2013209","journal-title":"Math Comput"},{"key":"497_CR22","series-title":"LNCS","first-page":"344","volume-title":"Advances in cryptology EUROCRYPT \u201993","author":"S Brands","year":"1993","unstructured":"Brands S, Chaum D (1993) Distance-bounding protocols. In: Advances in cryptology EUROCRYPT \u201993. LNCS, vol\u00a0765. Springer, Berlin, pp\u00a0344\u2013359"},{"key":"497_CR23","isbn-type":"print","volume-title":"Proc 1st intl conf on security and privacy for emerging areas in communications networks (SECURECOMM\u201905)","author":"GP Hancke","year":"2005","unstructured":"Hancke GP, Kuhn MG (2005) An RFID distance bounding protocol. In: Proc 1st intl conf on security and privacy for emerging areas in communications networks (SECURECOMM\u201905). IEEE, New York, ISBN 0-7695-2369-2","ISBN":"http:\/\/id.crossref.org\/isbn\/0769523692"},{"key":"497_CR24","series-title":"LNCS","first-page":"357","volume-title":"CHES 2004","author":"M Feldhofer","year":"2004","unstructured":"Feldhofer M, Dominikus S, Wolkerstorfer J (2004) Strong authentication for RFID systems using the AES algorithm. In: CHES 2004. LNCS, vol\u00a03156, pp\u00a0357\u2013370"},{"key":"497_CR25","unstructured":"National Institute of Standards and Technology (NIST) (2007) Secure Hash standard (SHS). FIPS 180-3, available at http:\/\/www.itl.nist.gov\/fipspubs\/ , June 2007"},{"key":"497_CR26","unstructured":"NIST (2001) Advanced Encryption Standard (AES), FIPS 197, available at: http:\/\/www.itl.nist.gov\/fipspubs\/ , Nov 2001"},{"key":"497_CR27","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/11807964_38","volume-title":"Proc embedded and ubiquitous computing (EUC\u201906)","author":"J-P Kaps","year":"2006","unstructured":"Kaps J-P, Sunar B (2006) Energy comparison of AES and SHA-1 for ubiquitous computing. In: Proc embedded and ubiquitous computing (EUC\u201906), Seoul, Korea, 1\u20134 Aug 2006, pp\u00a0372\u2013381"},{"key":"497_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISCE.2006.1689465","volume-title":"IEEE tenth intl symp on consumer electronics (ISCE \u201906)","author":"M Kim","year":"2006","unstructured":"Kim M, Ryou J, Choi Y, Jun S (2006) Low-cost cryptographic circuits for authentication in radio frequency identification systems. In: IEEE tenth intl symp on consumer electronics (ISCE \u201906), pp\u00a01\u20135"},{"key":"497_CR29","author":"T Good","year":"2009","unstructured":"Good T, Benaissa M (2009) 692nW advanced encryption standard (AES) on a 0.13\u00a0\u03bcm CMOS. IEEE Trans Very Large Scale Integr (VLSI) Syst, doi: 10.1109\/TVLSI.2009.2025952","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"497_CR30","unstructured":"Schneier B Blog on security, available online at: http:\/\/www.schneier.com\/blog\/archives\/2005\/11\/the_security_of_2.html"},{"key":"497_CR31","unstructured":"Marsaglia G DIEHARD tests. Available at: http:\/\/www.stat.fsu.edu\/pub\/diehard\/"},{"key":"497_CR32","unstructured":"NIST (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. SP800-22, available at: http:\/\/csrc.nist.gov\/publications\/PubsSPs.html"},{"issue":"5","key":"497_CR33","first-page":"615","volume":"47","author":"CS Petrie","year":"2000","unstructured":"Petrie CS, Connelly JA (2000) A\u00a0noise-based IC random number generator for applications in cryptography. IEEE TCAS-I 47(5):615\u2013621","journal-title":"IEEE TCAS-I"},{"issue":"1","key":"497_CR34","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TC.2007.250627","volume":"56","author":"B Sunar","year":"2007","unstructured":"Sunar B, Martin WJ, Stinson DR (2007) A\u00a0provably secure true random number generator with built-in tolerance to active attacks. Trans Comput 56(1):109\u2013119","journal-title":"Trans Comput"},{"key":"497_CR35","first-page":"1","volume-title":"Field programmable logic and applications (FPL \u201906)","author":"D Schellekens","year":"2006","unstructured":"Schellekens D, Preneel B, Verbauwhede I (2006) FPGA vendor agnostic true random number generator. In: Field programmable logic and applications (FPL \u201906), pp\u00a01\u20136"},{"key":"497_CR36","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/ESSCIR.2006.307549","volume-title":"Proc of the 32nd European solid-state circuits conf (ESSCIRC 2006)","author":"J Holleman","year":"2006","unstructured":"Holleman J, Otis B, Bridges S, Mitros A, Diorio C (2006) A 2.92 \u03bcW hardware random number generator. In: Proc of the 32nd European solid-state circuits conf (ESSCIRC 2006), pp\u00a0134\u2013137"},{"key":"497_CR37","first-page":"1955","volume-title":"IEEE Asia pacific conf on circuits and systems (APCCAS 2006)","author":"T Zhou","year":"2006","unstructured":"Zhou T, Zhou Z, Yu M, Ye Y (2006) Design of a low power high entropy chaos-based truly random number generator. In: IEEE Asia pacific conf on circuits and systems (APCCAS 2006), 4\u20137 Dec 2006, pp\u00a01955\u20131958"},{"issue":"4","key":"497_CR38","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1109\/TC.2003.1190581","volume":"52","author":"M Bucci","year":"2003","unstructured":"Bucci M, Germani L, Luzzi R, Trifiletti A, Varanonuovo M (2003) A\u00a0high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC. IEEE Trans Comput 52(4):403\u2013409","journal-title":"IEEE Trans Comput"},{"key":"497_CR39","unstructured":"Atmel Inc, U328-00-150kHz transponder interface datasheet. Available at: http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc4688.pdf"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0497-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0497-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0497-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:53:01Z","timestamp":1559843581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0497-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,8]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["497"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0497-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,8]]}}}