{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:54:20Z","timestamp":1768348460120,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Project of China","award":["2018YFB2100200"],"award-info":[{"award-number":["2018YFB2100200"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04252-y","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T11:03:14Z","timestamp":1643713394000},"page":"10893-10905","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3397-5659","authenticated-orcid":false,"given":"Ming","family":"Gao","sequence":"first","affiliation":[]},{"given":"YuBin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,1]]},"reference":[{"key":"4252_CR1","unstructured":"Kfir Z, Wool A (2005) Picking virtual pockets using relay attacks on contact\u2014less Smartcard Systems. In: Proceedings of the 1st Int\u2019l Conference on Security and Privacy for Emerging Areas in Comm. Networks (Securecomm 05), IEEE CS Press, 2005, pp 47\u201358"},{"issue":"2","key":"4252_CR2","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MPRV.2008.22","volume":"7","author":"P Rotter","year":"2008","unstructured":"Rotter P (2008) A Framework for Assessing RFID System Security and Privacy Risks. IEEE Pervasive Comput 7(2):70\u201377","journal-title":"IEEE Pervasive Comput"},{"issue":"9","key":"4252_CR3","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/TMC.2015.2492553","volume":"15","author":"G Avoine","year":"2016","unstructured":"Avoine G, Carpent X, Hernandez-Castro J (2016) Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans Mobile Comput 15(9):2317\u20132332","journal-title":"IEEE Trans Mobile Comput"},{"key":"4252_CR4","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Est\u00e9vez-Tapiador JM et al (2006) M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. In: International Conference on Ubiquitous Intelligence and Computing, pp 912\u2013923","DOI":"10.1007\/11833529_93"},{"key":"4252_CR5","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Est\u00e9vez-Tapiador JM et al (2006) LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security, pp 12\u201314","DOI":"10.1007\/11833529_93"},{"key":"4252_CR6","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM et al (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: OTM Confederated International Conferences\u201d On the Move to Meaningful Internet Systems\u201d, pp 352\u2013361","DOI":"10.1007\/11915034_59"},{"issue":"4","key":"4252_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H-Y Chien","year":"2007","unstructured":"Chien H-Y (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependab. Secure Comput. 4(4):337\u2013340","journal-title":"IEEE Trans. Dependab. Secure Comput."},{"issue":"5","key":"4252_CR8","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun. Lett. 16(5):702\u2013705","journal-title":"IEEE Commun. Lett."},{"key":"4252_CR9","doi-asserted-by":"crossref","unstructured":"Li T, Deng R (2007) Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In: The Second International Conference on Availability, Reliability and Security (ARES\u201907), pp. 238\u2013245","DOI":"10.1109\/ARES.2007.159"},{"key":"4252_CR10","doi-asserted-by":"crossref","unstructured":"Li T, Wang G (2007) Security analysis of two ultra-lightweight RFID authentication protocols. In: IFIP International Information Security Conference, pp 109\u2013120","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"4252_CR11","doi-asserted-by":"crossref","unstructured":"Ul Ain Q, Mahmood Y (2014) Cryptanalysis of Mutual Ultralightweight Authentication Protocols: SASI & RAPP, In: International Conference on Open Source Systems and Technologies","DOI":"10.1109\/ICOSST.2014.7029334"},{"key":"4252_CR12","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73:1085\u20131102","journal-title":"J. Supercomput."},{"key":"4252_CR13","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11227-017-2105-8","volume":"74","author":"K-H Wang","year":"2018","unstructured":"Wang K-H, Chen C-M, Fang W, Wu T-Y (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74:65\u201370","journal-title":"J Supercomput"},{"key":"4252_CR14","doi-asserted-by":"crossref","unstructured":"Khor Jing Huey, Sidorov Michail (2018) Weakness of Ultra-Lightweight Mutual Authentication Protocol for IoT Devices Using RFID Tags. In: 8th International Conference on Information Science and Technology, June 30\u20136, pp 91\u201397","DOI":"10.1109\/ICIST.2018.8426178"},{"issue":"8","key":"4252_CR15","first-page":"1","volume":"14","author":"Khalid Madiha","year":"2018","unstructured":"Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam (2018) Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks. Int J Distrib Sensor Netw 14(8):1\u20139","journal-title":"Int J Distrib Sensor Netw"},{"key":"4252_CR16","doi-asserted-by":"crossref","unstructured":"Huang Shao-Cheng, Tsai Chia-Wei, Hwang Tzonelih (2018) Comment on Cryptanalysis of A Novel Ultralightweight Mutual Authentication Protocol for IoT Devices Using RFID Tags. In: DSIT \u201918: Proceedings of the 2018 International Conference on Data Science and Information Technology, pp 23\u201327","DOI":"10.1145\/3239283.3239300"},{"key":"4252_CR17","doi-asserted-by":"crossref","unstructured":"Gong L, Needham RM, Yahalom R (1990) Reasoning about Belief in Cryptographic Protocols. In: IEEE Symposium on Security and Privacy, pp 234\u2013248","DOI":"10.1109\/RISP.1990.63854"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04252-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04252-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04252-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:46:50Z","timestamp":1651862810000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04252-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":17,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4252"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04252-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,1]]},"assertion":[{"value":"16 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}