{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:14:40Z","timestamp":1763388880902},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,12,25]],"date-time":"2013-12-25T00:00:00Z","timestamp":1387929600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11227-013-1073-x","type":"journal-article","created":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T07:16:10Z","timestamp":1387869370000},"page":"75-94","source":"Crossref","is-referenced-by-count":68,"title":["An efficient mutual authentication RFID scheme based on elliptic curve cryptography"],"prefix":"10.1007","volume":"70","author":[{"given":"Jue-Sam","family":"Chou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,25]]},"reference":[{"issue":"7","key":"1073_CR1","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1016\/j.comcom.2009.03.006","volume":"32","author":"AX Liu","year":"2009","unstructured":"Liu AX, Bailey LA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194\u20131199","journal-title":"Comput Commun"},{"key":"1073_CR2","unstructured":"EasyCard. http:\/\/www.easycard.com.tw\/"},{"issue":"15","key":"1073_CR3","doi-asserted-by":"crossref","first-page":"2744","DOI":"10.1016\/j.comnet.2010.05.005","volume":"54","author":"X Lin","year":"2010","unstructured":"Lin X, Lu R, Kwan D, Shen XS (2010) REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks. Comput Netw 54(15):2744\u20132755","journal-title":"Comput Netw"},{"issue":"1","key":"1073_CR4","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.adhoc.2007.12.004","volume":"7","author":"SV Kaya","year":"2009","unstructured":"Kaya SV, Sava E, Levi A, Er\u00e7etin \u00d6 (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw 7(1):136\u2013152","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"1073_CR5","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1016\/j.csi.2008.09.001","volume":"31","author":"EK Ryu","year":"2009","unstructured":"Ryu EK, Takagi T (2009) A hybrid approach for privacy-preserving RFID tags. Comput Stand Interfaces 31(4):812\u2013815","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"1073_CR6","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.comcom.2010.02.029","volume":"34","author":"JS Cho","year":"2011","unstructured":"Cho JS, Yeo SS, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391\u2013397","journal-title":"Comput Commun"},{"key":"1073_CR7","doi-asserted-by":"crossref","unstructured":"Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based. In: 2008 IEEE international conference on RFID. IEEE, pp 58\u201364","DOI":"10.1109\/RFID.2008.4519377"},{"key":"1073_CR8","unstructured":"Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to \u201cprivacy-friendly\u201d tags. In: RFID privacy workshop, vol 82. MIT, Cambridge"},{"key":"1073_CR9","doi-asserted-by":"crossref","unstructured":"Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing. Springer, Berlin, pp 201\u2013212","DOI":"10.1007\/978-3-540-39881-3_18"},{"issue":"3","key":"1073_CR10","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.comcom.2010.05.011","volume":"34","author":"TC Yeh","year":"2011","unstructured":"Yeh TC, Wu CH, Tseng YM (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337\u2013341","journal-title":"Comput Commun"},{"key":"1073_CR11","doi-asserted-by":"crossref","unstructured":"Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. In: Towards hardware-intrinsic security. Springer, Berlin, pp 237\u2013257","DOI":"10.1007\/978-3-642-14452-3_11"},{"key":"1073_CR12","unstructured":"Lee YK, Batina L, Verbauwhede I (2009) Untraceable RFID authentication protocols: revision of EC-RAC. In: 2009 IEEE international conference on RFID. IEEE, pp 178\u2013185"},{"issue":"1","key":"1073_CR13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1609956.1609963","volume":"13","author":"A Juels","year":"2009","unstructured":"Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur (TISSEC) 13(1):7","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"1073_CR14","unstructured":"Yamada I, Shiotsu S, Itasaki A, Inano S, Yasaki K, Takenaka M (2005) Secure active RFID tag system. In: Proceedings of Ubicomp 2005 workshop"},{"key":"1073_CR15","first-page":"100","volume":"577","author":"S Kinoshita","year":"2005","unstructured":"Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active RFID tag. Cognit Sci Res Paper Univ Sussex CSRP 577:100","journal-title":"Cognit Sci Res Paper Univ Sussex CSRP"},{"key":"1073_CR16","unstructured":"Kim HW, Lim SY, Lee HJ (2006) Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: Hybrid information technology. International conference on ICHIT\u201906, IEEE, vol 2, pp 718\u2013723"},{"key":"1073_CR17","doi-asserted-by":"crossref","unstructured":"Oyarhossein S, Mohammadi S (2009) Cryptography and authentication processing framework on RFID active tags for carpet products. In: IEEE international conference on communications technology and applications, 2009. ICCTA\u201909. IEEE, pp 26\u201331","DOI":"10.1109\/ICCOMTA.2009.5349244"},{"issue":"12","key":"1073_CR18","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1049\/iet-com.2010.0625","volume":"5","author":"H Ning","year":"2011","unstructured":"Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755\u20131768","journal-title":"IET Commun"},{"key":"1073_CR19","doi-asserted-by":"crossref","unstructured":"Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for RFID-tags. In: Pervasive computing and communications workshops, 2007. Fifth annual IEEE international conference on PerCom workshops\u2019 07. IEEE, pp 217\u2013222","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"1073_CR20","unstructured":"Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on RFID. In: Workshop on RFID security, pp 12\u201314"},{"key":"1073_CR21","unstructured":"F\u00fcrbass F (2006) ECC signature generation device for RFID tags"},{"key":"1073_CR22","doi-asserted-by":"crossref","unstructured":"Furbass F, Wolkerstorfer J (2007) ECC processor with low die size for RFID applications. In: IEEE international symposium on circuits and systems, 2007. ISCAS 2007. IEEE, pp 1835\u20131838","DOI":"10.1109\/ISCAS.2007.378271"},{"key":"1073_CR23","doi-asserted-by":"crossref","unstructured":"Ahamed SI, Rahman F, Hoque E (2008) ERAP: ECC based RFID authentication protocol. In: 12th IEEE international workshop on future trends of distributed computing systems, 2008. FTDCS\u201908. IEEE, pp 219\u2013225","DOI":"10.1109\/FTDCS.2008.20"},{"key":"1073_CR24","unstructured":"Luo P, Wang X, Feng J, Xu Y (2008) Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In: 9th international conference on solid-state and integrated-circuit technology, 2008. ICSICT 2008. IEEE, pp 1681\u20131684"},{"key":"1073_CR25","unstructured":"Fan J, Batina L, Verbauwhede I (2009) Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In: International conference for internet technology and secured transactions, 2009. ICITST 2009. IEEE, pp 1\u20136"},{"key":"1073_CR26","doi-asserted-by":"crossref","unstructured":"Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650\u2013657","DOI":"10.1109\/WCINS.2010.5541860"},{"issue":"1","key":"1073_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1049\/iet-cdt.2008.0165","volume":"4","author":"M O\u2019Neill","year":"2010","unstructured":"O\u2019Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14\u201326","journal-title":"Comput Digital Tech IET"},{"key":"1073_CR28","unstructured":"Ko WT, Chiou SY, Lu EH, Chang HC (2011) An improvement of privacy-preserving ECC-based grouping proof for RFID. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), 2011, vol 2. IEEE, pp 1062\u20131064"},{"key":"1073_CR29","unstructured":"Nathan BT, Meenakumari R, Usha S (2011) Formation of elliptic curve using finger print for network security. In: International conference on process automation, control and computing (PACC), 2011. IEEE, pp 1\u20135"},{"issue":"12","key":"1073_CR30","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/JSEN.2011.2160052","volume":"11","author":"H Liu","year":"2011","unstructured":"Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235\u20133245","journal-title":"IEEE Sensors J"},{"key":"1073_CR31","doi-asserted-by":"crossref","unstructured":"Pendl C, Pelnar M, Hutter M (2012) Elliptic curve cryptography on the WISP UHF RFID tag. In: RFID. Security and privacy. Springer, Berlin, pp 32\u201347","DOI":"10.1007\/978-3-642-25286-0_3"},{"issue":"7","key":"1073_CR32","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","volume":"24","author":"H Liu","year":"2012","unstructured":"Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2012) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321\u20131330","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"1073_CR33","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MPRV.2011.42","volume":"11","author":"R Peeters","year":"2012","unstructured":"Peeters R, Singelee D, Preneel B (2012) Toward More Secure and reliable access control. IEEE Pervasive Comput 11(3):76\u201383","journal-title":"IEEE Pervasive Comput"},{"key":"1073_CR34","doi-asserted-by":"crossref","unstructured":"Juels A, Molnar D, Wagner D (2005) Security and privacy ussues in e-passports. In: First international conference on security and privacy for emerging areas in communications networks, 2005. SecureComm 2005. IEEE, pp 74\u201388","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"1073_CR35","unstructured":"Jeng AB, Chen LY (2009) How to enhance the security of e-passport. In: 2009 international conference on machine learning and cybernetics, vol 5. IEEE, pp 2922\u20132926"},{"issue":"6","key":"1073_CR36","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2007.164","volume":"5","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay S (2007) E-passport threats. IEEE Secur Privacy 5(6):61\u201364","journal-title":"IEEE Secur Privacy"},{"key":"1073_CR37","doi-asserted-by":"crossref","unstructured":"Abid M, Afifi H (2008) Secure e-passport protocol using elliptic curve Diffie-Hellman key agreement protocol. In: Fourth international conference on information assurance and security, 2008. ISIAS\u201908. IEEE, pp 99\u2013102","DOI":"10.1109\/IAS.2008.22"},{"key":"1073_CR38","doi-asserted-by":"crossref","unstructured":"Abid M, Kanade S, Petrovska-Delacr\u00e9taz D, Dorizzi B, Afifi H (2010) Iris based authentication mechanism for e-passports. In: 2nd international workshop on security and communication networks (IWSCN), 2010. IEEE, pp 1\u20135","DOI":"10.1109\/IWSCN.2010.5497990"},{"issue":"18","key":"1073_CR39","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1016\/j.comcom.2008.05.006","volume":"31","author":"SY Kang","year":"2008","unstructured":"Kang SY, Lee DG, Lee IY (2008) A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput Commun 31(18):4248\u20134254","journal-title":"Comput Commun"},{"issue":"8","key":"1073_CR40","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TPDS.2011.290","volume":"23","author":"B Alomair","year":"2012","unstructured":"Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536\u20131550","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"18","key":"1073_CR41","doi-asserted-by":"crossref","first-page":"2155","DOI":"10.1016\/j.comcom.2010.08.006","volume":"33","author":"B Alomair","year":"2010","unstructured":"Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155\u20132163","journal-title":"Comput Commun"},{"issue":"4","key":"1073_CR42","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556\u2013566","journal-title":"Comput Commun"},{"issue":"1","key":"1073_CR43","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"1","author":"R Doss","year":"2012","unstructured":"Doss R, Sundaresan S, Zhou W (2012) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 1(1):383\u2013396","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"1073_CR44","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.comnet.2011.09.008","volume":"56","author":"M Moessner","year":"2012","unstructured":"Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):273\u2013286","journal-title":"Comput Netw"},{"issue":"15","key":"1073_CR45","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1016\/j.comnet.2012.06.018","volume":"56","author":"R Doss","year":"2012","unstructured":"Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401\u20133416","journal-title":"Comput Netw"},{"issue":"3","key":"1073_CR46","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.comcom.2010.06.014","volume":"34","author":"DN Duc","year":"2011","unstructured":"Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):384\u2013390","journal-title":"Comput Commun"},{"key":"1073_CR47","unstructured":"EPCglobal. http:\/\/www.epcglobalinc.org"},{"key":"1073_CR48","doi-asserted-by":"crossref","unstructured":"Van Le T, Burmester M, De Medeiros B (2007) Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of the 2nd ACM symposium on information, computer and communications security. ACM, pp 242\u2013252","DOI":"10.1145\/1229285.1229319"},{"issue":"4","key":"1073_CR49","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1513601.1513603","volume":"12","author":"M Burmester","year":"2009","unstructured":"Burmester M, Van Le T, De Medeiros B, Tsudik G (2009) Universally composable RFID identification and authentication protocols. ACM Trans Inf Syst Secur (TISSEC) 12(4):21","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"issue":"12","key":"1073_CR50","doi-asserted-by":"crossref","first-page":"7678","DOI":"10.1016\/j.eswa.2010.04.074","volume":"37","author":"TC Yeh","year":"2010","unstructured":"Yeh TC, Wang YJ, Kuo TC, Wang SS (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678\u20137683","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1073_CR51","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1016\/j.eswa.2011.07.053","volume":"39","author":"EJ Yoon","year":"2012","unstructured":"Yoon EJ (2012) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 39(1):1589\u20131594","journal-title":"Expert Syst Appl"},{"issue":"4","key":"1073_CR52","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien HY (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337\u2013340","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"1073_CR53","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RW Phan","year":"2009","unstructured":"Phan RW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol\u2014SASI. IEEE Trans Depend Secure Comput 6(4):316\u2013320","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"1073_CR54","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T Cao","year":"2009","unstructured":"Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. IEEE Trans Depend Secure Comput 6(1):73\u201377","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"2","key":"1073_CR55","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"HM Sun","year":"2011","unstructured":"Sun HM, Ting WC, Wang KH (2011) On the security of Chien\u2019s ultralightweight RFID authentication protocol. IEEE Trans Depend Secure Comput 8(2):315\u2013317","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"1073_CR56","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TDSC.2010.75","volume":"8","author":"P D\u2019Arco","year":"2011","unstructured":"D\u2019Arco P, De Santis A (2011) On ultralightweight RFID authentication protocols. IEEE Trans Depend Secure Comput 8(4):548\u2013563","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"5","key":"1073_CR57","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702\u2013705","journal-title":"IEEE Commun Lett"},{"issue":"11","key":"1073_CR58","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"YK Lee","year":"2008","unstructured":"Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic-curve-based security processor for RFID. IEEE Trans Comput 57(11):1514\u20131527","journal-title":"IEEE Trans Comput"},{"key":"1073_CR59","doi-asserted-by":"crossref","unstructured":"Gaubatz G, Kaps JP, Ozturk E, Sunar B (2005) State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Pervasive computing and communications workshops, 2005. Third IEEE international conference on PerCom 2005 workshops. IEEE, pp 146\u2013150","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"1073_CR60","doi-asserted-by":"crossref","unstructured":"Tuyls P, Batina L (2006) RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006. Springer, Berlin, pp 115\u2013131","DOI":"10.1007\/11605805_8"},{"key":"1073_CR61","doi-asserted-by":"crossref","unstructured":"Lee YK, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE international conference on RFID. IEEE, pp 97\u2013104","DOI":"10.1109\/RFID.2008.4519370"},{"key":"1073_CR62","unstructured":"Mao W (2003) Modern cryptography\u2014theory And practice. Prentice Hall, New Jersey, pp 196\u2013203"},{"issue":"12","key":"1073_CR63","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1016\/j.comnet.2008.04.016","volume":"52","author":"Y Chen","year":"2008","unstructured":"Chen Y, Chou JS, Sun HM (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373\u20132380","journal-title":"Comput Netw"},{"issue":"7","key":"1073_CR64","first-page":"20","volume":"3","author":"T Cao","year":"2008","unstructured":"Cao T, Shen P, Bertino E (2008) Cryptanalysis of some RFID authentication protocols. J Commun 3(7):20\u201327","journal-title":"J Commun"},{"key":"1073_CR65","unstructured":"Stinson DR (1995) Cryptography\u2014theory and practice, CRC Press Inc., Boca Raton"},{"key":"1073_CR66","doi-asserted-by":"crossref","unstructured":"Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In: Applied cryptography and network security. Springer, Berlin, pp 479\u2013489","DOI":"10.1007\/978-3-540-68914-0_29"},{"key":"1073_CR67","doi-asserted-by":"crossref","unstructured":"Habibi MH, Aref MR, Ma D (2011) Addressing flaws in RFID authentication protocols. In: Progress in cryptology-INDOCRYPT 2011. Springer, Berlin, pp 216\u2013235","DOI":"10.1007\/978-3-642-25578-6_17"},{"key":"1073_CR68","unstructured":"Lim CH, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Information and communications security. Springer, Berlin, pp 1\u201320"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1073-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-1073-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-1073-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T09:17:43Z","timestamp":1564996663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-1073-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,25]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["1073"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-1073-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,25]]}}}