{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T01:44:55Z","timestamp":1649123095304},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,5,10]],"date-time":"2012-05-10T00:00:00Z","timestamp":1336608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11277-012-0652-0","type":"journal-article","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T00:46:47Z","timestamp":1336524407000},"page":"1583-1596","source":"Crossref","is-referenced-by-count":5,"title":["Security and Privacy Analysis of Song\u2013Mitchell RFID Authentication Protocol"],"prefix":"10.1007","volume":"69","author":[{"given":"Mohammad Hassan","family":"Habibi","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,10]]},"reference":[{"key":"652_CR1","first-page":"102","volume-title":"ICISC 2007. LNCS","author":"B. Alomair","year":"2007","unstructured":"Alomair B., Lazos L., Poovendran R. (2007) Passive attacks on a class of authentication protocols for RFID. In: Nam K.-H., Rhee G. (eds) ICISC 2007. LNCS. Springer, Heidelberg, pp 102\u2013115"},{"key":"652_CR2","doi-asserted-by":"crossref","unstructured":"Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash based RFID protocol. In Proceedings of international workshop on pervasive computing and communication security-PerSec 2005, IEEE Computer Society Press, (pp. 110\u2013114).","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"652_CR3","unstructured":"Avoine, G. (2005). Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005\/049, http:\/\/eprint.iacr.org\/2005\/049 ."},{"key":"652_CR4","unstructured":"Avoine, G. (2005). Cryptography in radio frequency identification and fair ex-change protocols. Phd Thesis no. 3407, EPFL, http:\/\/library.epfl.ch\/theses\/?nr=3407 ."},{"key":"652_CR5","first-page":"291","volume-title":"SAC 2005. LNCS","author":"G. Avoine","year":"2006","unstructured":"Avoine G., Dysli E., Oechslin P. (2006) Reducing time complexity in RFID systems. In: Preneel B., Tavares S. (eds) SAC 2005. LNCS. Springer, Heidelberg, pp 291\u2013306"},{"key":"652_CR6","doi-asserted-by":"crossref","DOI":"10.1002\/9780470168226","volume-title":"RFID applied","author":"J. Banks","year":"2007","unstructured":"Banks J., Pachano M., Thompson L., Hanny D. (2007) RFID applied. Wiley, Hoboken, New Jersey"},{"key":"652_CR7","unstructured":"Burmester, M., van Le, T., & de Medeiros, B. (2006). Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In SecureComm 2006. Conference on security and privacy for emerging areas in communication networks, Baltimore, USA: IEEE press."},{"key":"652_CR8","unstructured":"Burmester, M., van Le, T., & de Medeiros, B. (2007). Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of ASIACCS (pp. 242\u2013252). New York: ACM Press."},{"key":"652_CR9","first-page":"391","volume-title":"Proceedings of WISA 2007, lecture notes in computer science","author":"D. Carluccio","year":"2007","unstructured":"Carluccio D., Lemke-Rust K., Paar C., Sadeghi A.-R. (2007) E-passport: The global traceability or how to feel like an UPS package. In: Lee J. K., Yi O., Yung M. (eds) Proceedings of WISA 2007, lecture notes in computer science. Springer, Berlin, pp 391\u2013404"},{"key":"652_CR10","unstructured":"Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of SecureComm 2005 (pp. 59\u201366)."},{"key":"652_CR11","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., & Sibert, H. An active attack against HB+-A provably secure lightweight authentication protocol. Cryptology ePrint Archive, http:\/\/eprint.iacr.org\/2005\/23.pdf .","DOI":"10.1049\/el:20052622"},{"key":"652_CR12","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-540-88313-5_18","volume-title":"ESORICS 2008. LNCS","author":"J. Ha","year":"2008","unstructured":"Ha J., Moon S., Zhou J., Ha J. (2008) A new formal proof model for RFID location privacy. In: Jajodia S., Lopez J. (eds) ESORICS 2008. LNCS. Springer, Heidelberg, pp 267\u2013281"},{"key":"652_CR13","unstructured":"Hancke, G. P. (2004). Eavesdropping attacks on high-frequency RFID tokens. In R. Sandhu, & R. Thomas (Eds.), Proceedings of the 4th Workshop on RFID Security, RFIDSec08, (2008) identification devices using varying identifiers. International workshop on pervasive computing and communication security PerSec."},{"key":"652_CR14","first-page":"22","volume-title":"RFIDSec 2010. LNCS","author":"J. C. Hernndez Castro","year":"2010","unstructured":"Hernndez Castro J. C., Peris-Lopez P., Phan R. C.-W., Estvez-Tapiador J. M. (2010) Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol. In: Ors Yalcin S. B. (ed) RFIDSec 2010. LNCS. Springer, Heidelberg, pp 22\u201334"},{"key":"652_CR15","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F., & Preneel, B. (2011). A new RFID privacy model. In: V. Atluri, & C. Diaz (Eds.), ESORICS 2011, LNCS 6879 (pp. 568\u2013587)."},{"key":"652_CR16","doi-asserted-by":"crossref","unstructured":"Juels, A. (2005). Strengthening EPC tags against cloning. In the Proceedings of WiSe\u201905.","DOI":"10.1145\/1080793.1080805"},{"key":"652_CR17","unstructured":"Juels, A., & Weis, S. (2006). Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006\/137, http:\/\/eprint.iacr.org\/2006\/137 ."},{"issue":"7","key":"652_CR18","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00779-006-0116-1","volume":"11","author":"S. Konomi","year":"2007","unstructured":"Konomi S., Roussos G. (2007) Ubiquitous computing in the real world: Lessons learnt from large scale RFID deployments. Personal and Ubiquitous Computing 11(7): 507\u2013521","journal-title":"Personal and Ubiquitous Computing"},{"key":"652_CR19","unstructured":"Li, L., & Deng, R. H. (2007). Vulnerability analysis of EMAP-An efficient RFID mutual authentication protocol. In: AReS 2007: Second international conference on availability, reliability and security."},{"issue":"3","key":"652_CR20","first-page":"1","volume":"3","author":"T. Li","year":"2008","unstructured":"Li T., Wang G., Deng R. H. (2008) Security analysis on a family of ultra-lightweight RFID authentication protocols. Journal of Software 3(3): 1\u201310","journal-title":"Journal of Software"},{"key":"652_CR21","first-page":"1","volume-title":"ICICS 2006. LNCS","author":"C. H. Lim","year":"2006","unstructured":"Lim C. H., Kwon T. (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning P., Qing S., Li N. (eds) ICICS 2006. LNCS. Springer, Heidelberg, pp 1\u201320"},{"key":"652_CR22","doi-asserted-by":"crossref","unstructured":"Ma, C., Li, Y., Deng, R., & Li, T. (2009). RFID privacy: Relation between two notions, minimal condition, and efficient construction. In ACM CCS.","DOI":"10.1145\/1653662.1653670"},{"key":"652_CR23","unstructured":"Michelin Embeds RFID Tags in Tires. RFID Journal, http:\/\/www.rfidjournal.com\/article\/articleview\/269\/1\/1\/ ."},{"issue":"5","key":"652_CR24","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A. Mitrokotsa","year":"2010","unstructured":"Mitrokotsa A., Rieback M. R., Tanenbaum A. S. (2010) Classifying RFID attacks and defenses. Information Systems Frontiers-ISF 12(5): 491\u2013505","journal-title":"Information Systems Frontiers-ISF"},{"key":"652_CR25","volume-title":"UbiComp 2004. LNCS","author":"M. Ohkubo","year":"2004","unstructured":"Ohkubo M., Suzuki K., Kinoshita S. (2004) Efficient hash-chain based RFID privacy protection scheme. In: Davies N., Mynatt E. D., Siio I. (eds) UbiComp 2004. LNCS. Springer, Heidelberg"},{"key":"652_CR26","first-page":"263","volume-title":"ISPEC 2008. LNCS","author":"K. Ouafi","year":"2008","unstructured":"Ouafi K., Phan R. C.-W. (2008) Privacy of recent RFID authentication protocols. In: Chen L., Mu Y., Susilo W. (eds) ISPEC 2008. LNCS. Springer, Heidelberg, pp 263\u2013277"},{"key":"652_CR27","first-page":"479","volume-title":"ACNS 2008. LNCS","author":"K. Ouafi","year":"2008","unstructured":"Ouafi K., Phan R. C.-W. et\u00a0al (2008) Traceable privacy of recent provably-secure RFID protocols. In: Bellovin S. M. (ed) ACNS 2008. LNCS. Springer, Berlin, Heidelberg, pp 479\u2013489"},{"issue":"9","key":"652_CR28","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1016\/j.comnet.2009.11.007","volume":"54","author":"P. Peris-Lopez","year":"2010","unstructured":"Peris-Lopez P., Hernandez-Castro J. C., Estevez-Tapiador J. M., Ribagorda A. (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks 54(9): 1502\u20131508","journal-title":"Computer Networks"},{"key":"652_CR29","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernndez Castro, J. C., Estvez-Tapiador, J. M., & van der Lubbe, J. C. A. (2010). Security flaws in a recent ultralightweight RFID protocol. In Workshop on RFID security (RFIDSec Asia\u201910), volume 4 of cryptology and information security series (pp. 83\u201393). IOS Press.","DOI":"10.1007\/978-3-642-16342-5_28"},{"issue":"4","key":"652_CR30","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/LCOMM.2009.082117","volume":"13","author":"P. Rizomiliotis","year":"2009","unstructured":"Rizomiliotis P., Rekleitis E., Gritzalis S. (2009) Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters 13(4): 274\u2013276","journal-title":"IEEE Communications Letters"},{"key":"652_CR31","unstructured":"Schuerenberg, B. K. (2005). Keeping tabs with RFID. Health Data Management, http:\/\/www.healthdatamanagement.com\/issues\/20051001\/11276-1.html ."},{"key":"652_CR32","unstructured":"Song, B. (2008). RFID tag ownership transfer. In Proceedings of workshop on RFID security (RFIDsec 2008), Budapest, Hungary."},{"key":"652_CR33","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1145\/1352533.1352556","volume-title":"ACM conference on wireless network security WiSec08","author":"B. Song","year":"2008","unstructured":"Song B., Mitchell C. J. (2008) RFID authentication protocol for low-cost tags. In: Gligor V.D., Hubaux J., Poovendran R. (eds) ACM conference on wireless network security WiSec08. ACM Press, USA, pp 140\u2013147"},{"key":"652_CR34","doi-asserted-by":"crossref","unstructured":"Song B., Mitchell C. J. (2009) Scalable RFID pseudonym protocol. In Proceedings of the third international conference on network and system security NSS 2009. IEEE Computer Society, (pp. 216\u2013224).","DOI":"10.1109\/NSS.2009.15"},{"issue":"4","key":"652_CR35","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B. Song","year":"2011","unstructured":"Song B., Mitchell C. J. (2011) Scalable RFID security protocols supporting tag ownership transfer. Computer Communications 34(4): 556\u2013566","journal-title":"Computer Communications"},{"key":"652_CR36","doi-asserted-by":"crossref","unstructured":"Tsudik, G. (2006). YA-TRAP: Yet another trivial RFID authentication protocol. In Proceedings of PerCom 2006 (pp. 640\u2013643).","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"652_CR37","first-page":"1","volume-title":"WISTP 2008. LNCS","author":"T. Deursen van","year":"2008","unstructured":"van Deursen T., Mauw S., Radomirovi\u0107 S. et\u00a0al (2008) Untraceability of RFID protocols. In: Onieva J. A. (ed) WISTP 2008. LNCS. Springer, Heidelberg, pp 1\u201315"},{"key":"652_CR38","unstructured":"van Deursen, T., & Radomirovic, S. (2008). Attacks on RFID protocols. Cryptology ePrint archive, Report 2008\/310, http:\/\/eprint.iacr.org\/2008\/310 ."},{"key":"652_CR39","unstructured":"van Deursen, T., & Radomirovi\u0107, S. (2009). Algebraic attacks on RFID Protocols. In Proceedings of information security theory and practices: Smart devices, pervasive systems, and ubiquitous networks (WISTP\u201909). LNCS (Vol. 5746, pp. 38\u201351). Springer."},{"key":"652_CR40","unstructured":"Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), ASIACRYPT 2007. LNCS, (Vol. 4833, pp. 68\u201387). Heidelberg, New York: Springer (2003) 454\u2013469."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0652-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0652-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0652-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T12:03:25Z","timestamp":1561723405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0652-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,10]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["652"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0652-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,10]]}}}