{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:24Z","timestamp":1759132044292},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T00:00:00Z","timestamp":1413331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s11277-014-1966-x","type":"journal-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T15:33:57Z","timestamp":1413300837000},"page":"1941-1958","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple"],"prefix":"10.1007","volume":"79","author":[{"given":"Lijun","family":"Gao","sequence":"first","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yantai","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuhua","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,15]]},"reference":[{"issue":"2","key":"1966_CR1","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381\u2013394.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"1966_CR2","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1109\/TMC.2008.175","volume":"8","author":"HM Sun","year":"2009","unstructured":"Sun, H. M., & Ting, W. C. (2009). A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 8(8), 1052\u20131062.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1966_CR3","first-page":"2","volume":"6","author":"SE Sarma","year":"2003","unstructured":"Sarma, S. E., Weis, S. A., & Engels, D. W. (2003). Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 6(1), 2\u20139.","journal-title":"RSA Laboratories Cryptobytes"},{"key":"1966_CR4","unstructured":"Weis, S. A. (2003). Security and privacy in radio-frequency identification devices. Massachusetts Institute of Technology."},{"key":"1966_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R. L., & Szydlo, M. (2003). The Blocker Tag: Selective blocking of RFID tags for consumer privacy. In Proceedings of the l0th ACM conference of computer and communications security (pp. l03\u2013111).","DOI":"10.1145\/948109.948126"},{"issue":"4","key":"1966_CR6","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"3","author":"HY Chien","year":"2007","unstructured":"Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transaction of Dependable and Secure Computing, 3(4), 337\u2013340.","journal-title":"IEEE Transaction of Dependable and Secure Computing"},{"key":"1966_CR7","doi-asserted-by":"crossref","unstructured":"Sarma, S. E., Weis, S. A., & Engels, D. W. (2003). RFID systems and security and privacy implications. In Proceedings of the 4th international workshop on cryptographic hardware and embedded systems (pp. 454\u2013469).","DOI":"10.1007\/3-540-36400-5_33"},{"key":"1966_CR8","doi-asserted-by":"crossref","unstructured":"Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proceedings of 2nd IEEE annual conference on pervasive computing and communications workshops (pp. 149\u2013153).","DOI":"10.1109\/PERCOMW.2004.1276922"},{"issue":"4","key":"1966_CR9","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1007\/s11277-012-0770-8","volume":"68","author":"L Gao","year":"2013","unstructured":"Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and synchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943\u20131959.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"1966_CR10","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/s10796-009-9216-6","volume":"12","author":"S Zhou","year":"2010","unstructured":"Zhou, S., Zhang, Z., & Luo, Z. (2010). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers, 12(5), 521\u2013528.","journal-title":"Information Systems Frontiers"},{"key":"1966_CR11","unstructured":"Blurn, A., Furst, M., & Keams, M. (1993). Cryptographie primitives based on hard leaming problems. Advances in Cryptology-CRYPTO, 773(1993), 1\u201310."},{"key":"1966_CR12","unstructured":"Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. Advances in Cryptology-CRYPTO, 3621(2005), 293\u2013308."},{"key":"1966_CR13","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., & Dottax, E. (2006). HB++: A lightweight authentication protocol secure against some attacks. In Proceedings of IEEE international conference on pervasive services workshop on security (pp. 28\u201333).","DOI":"10.1109\/SECPERU.2006.10"},{"key":"1966_CR14","unstructured":"Piramuthu, S. (2007). HB and related lightweight authentication protocols for secure RFID tag\/reader authentication. In Proceedings of the CollECTeR (Europe) conference (pp. 1\u20138)."},{"key":"1966_CR15","unstructured":"Duc, D. N., Park, J., Lee, H., & Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. White Paper, pp. 1\u201311."},{"issue":"1","key":"1966_CR16","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"11","author":"R Doss","year":"2012","unstructured":"Doss, R., Saravanan, S., & Zhou, W. L. (2012). A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11(1), 383\u2013396.","journal-title":"Ad Hoc Networks"},{"issue":"15","key":"1966_CR17","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1016\/j.comnet.2012.06.018","volume":"56","author":"R Doss","year":"2012","unstructured":"Doss, R., Zhou, W. L., Saravanan, S., Yu, S., & Gao, L. X. (2012). A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks, 56(15), 3401\u20133416.","journal-title":"Computer Networks"},{"key":"1966_CR18","doi-asserted-by":"crossref","unstructured":"Lopez, P. P., & Castro, J. H. (2006). $$\\text{ M }^{2}\\text{ AP }$$ M 2 AP : A minimalist mutual-authentication protocol for low-cost RFID tags. In Proceedings of the international conference on ubiquitous intelligence and computing (pp. 912\u2013923).","DOI":"10.1007\/11833529_93"},{"key":"1966_CR19","unstructured":"B\u00e1r\u00e1sz, M., Boros, B., & L\u00f3ja, P. L. K. (2007). Passive attack against the $$\\text{ M }^{2}\\text{ AP }$$ M 2 AP mutual authentication protocol for RFID tags. In Proceedings of the first international workshop on RFID technology (pp. 1\u20134)."},{"issue":"2","key":"1966_CR20","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"HM Sun","year":"2011","unstructured":"Sun, H. M., Ting, W. C., & Wang, K. H. (2011). On the security of Chien\u2019s ultralightweight RFID authentication protocol. IEEE Transaction Dependable and Secure Computing, 8(2), 315\u2013317.","journal-title":"IEEE Transaction Dependable and Secure Computing"},{"key":"1966_CR21","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., & Tapiador, J. M. E. (2009). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In Proceedings of the 9th international workshop on information security applications (pp. 56\u201368).","DOI":"10.1007\/978-3-642-00306-6_5"},{"issue":"2","key":"1966_CR22","first-page":"27","volume":"2","author":"EG Ahmed","year":"2010","unstructured":"Ahmed, E. G., Shaaban, E., & Hashem, M. (2010). Lightweight mutual authentication protocol for low cost RFID tags. Journal of Network and Computer Applications, 2(2), 27\u201337.","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"1966_CR23","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian, Y., Chen, G. L., & Li, J. H. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702\u2013705.","journal-title":"IEEE Communications Letters"},{"issue":"5","key":"1966_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jnca.2013.10.014","volume":"41","author":"L Gao","year":"2014","unstructured":"Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41(5), 37\u201346.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"1966_CR25","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TDSC.2010.75","volume":"8","author":"D Paolo","year":"2011","unstructured":"Paolo, D., & Santis, A. D. (2011). On ultralightweight RFID authentication protocols. IEEE Transactions on Dependable and Secure Computing, 8(4), 548\u2013563.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"1966_CR26","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1016\/j.jnca.2011.12.001","volume":"35","author":"G Avoine","year":"2012","unstructured":"Avoine, G., Carpent, X., & Martin, B. (2012). Privacy-friendly synchronized ultralightweight authentication protocols in the storm. Journal of Network and Computer Applications, 35(2), 826\u2013843.","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1966-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1966-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1966-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T05:30:30Z","timestamp":1565933430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1966-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,15]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1966"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1966-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,15]]}}}