{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T20:24:19Z","timestamp":1693686259868},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,5,15]],"date-time":"2015-05-15T00:00:00Z","timestamp":1431648000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11277-015-2676-8","type":"journal-article","created":{"date-parts":[[2015,5,14]],"date-time":"2015-05-14T04:33:00Z","timestamp":1431577980000},"page":"1069-1088","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Solving Scalability Problems on Secure RFID Grouping-Proof Protocol"],"prefix":"10.1007","volume":"84","author":[{"given":"Cheng-Ter","family":"Hsi","sequence":"first","affiliation":[]},{"given":"Yuan-Hung","family":"Lien","sequence":"additional","affiliation":[]},{"given":"Jung-Hui","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Henry Ker-Chang","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,15]]},"reference":[{"issue":"1","key":"2676_CR1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11277-010-0188-0","volume":"59","author":"I Erguler","year":"2011","unstructured":"Erguler, I., & Anarim, E. (2011). Scalability and security conflict for RFID authentication protocols. Wireless Personal Communications, 59(1), 43\u201356.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2676_CR2","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556\u2013566.","journal-title":"Computer Communications"},{"issue":"18","key":"2676_CR3","doi-asserted-by":"crossref","first-page":"2155","DOI":"10.1016\/j.comcom.2010.08.006","volume":"33","author":"B Alomair","year":"2010","unstructured":"Alomair, B., & Poovendran, R. (2010). Privacy versus scalability in radio frequency identification systems. Computer Communications, 33(18), 2155\u20132163.","journal-title":"Computer Communications"},{"key":"2676_CR4","first-page":"1","volume":"609","author":"DN Duc","year":"2009","unstructured":"Duc, D. N., & Kim, K. (2009). Grouping-proof protocol for RFID tags: Security definition and scalable construction. International Association for Cryptologic Research, ePrint, 609, 1\u20139.","journal-title":"International Association for Cryptologic Research, ePrint"},{"key":"2676_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A. (2004). Yoking-proofs for RFID tags. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (pp. 138\u2013143). DC, USA.","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"2676_CR6","unstructured":"Bolotnyy, L. & Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. Proceedings of IEEE International Conference on Mobile and Ubiquitous Systems (pp. 1\u20134). San Jose, California."},{"key":"2676_CR7","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Lai, Y.-C., Tygar, J. D., Yang, C.-K., Chiang C.-L. (2007). Coexistence proof using chain of timestamps for multiple RFID tags. In The Proceedings of APWeb\/WAIM International Workshop (pp. 634\u2013643). Springer LNCS 5189.","DOI":"10.1007\/978-3-540-72909-9_70"},{"key":"2676_CR8","doi-asserted-by":"crossref","unstructured":"Cho, J.-S., Yeo, S.-S., Hwang, S., Rhee, S.-Y., Kim, S. K. (2008). Enhanced yoking proof protocols for RFID tags and tag groups. Proceedings of the 22nd Advanced Information Networking and Applications (pp. 1591\u20131596). Okinawa, Japan.","DOI":"10.1109\/WAINA.2008.204"},{"key":"2676_CR9","doi-asserted-by":"crossref","unstructured":"Saito, J. & Sakural, K. (2005). Grouping proof for RFID tags. Proceedings of the 19th International Conference On AINA\u201905 (pp. 621\u2013624). Taipei, Taiwan.","DOI":"10.1109\/AINA.2005.197"},{"key":"2676_CR10","doi-asserted-by":"crossref","unstructured":"Piramuthu, S. (2006). On existence proofs for multiple RFID tags. In The Proceedings of ACS\/IEEE International Conference on Pervasive Services, IEEE Computer Society (pp. 317\u2013320). Lyon, France.","DOI":"10.1109\/PERSER.2006.1652252"},{"key":"2676_CR11","doi-asserted-by":"crossref","unstructured":"Burmester, M., Medeiros, B. de, Motta, R. (2008). \u2018Provably secure grouping-proofs for RFID tags. In The Proceedings of CARDIS International Conference (pp. 176\u2013190). Springer LNCS 5189.","DOI":"10.1007\/978-3-540-85893-5_13"},{"key":"2676_CR12","unstructured":"Duc, D.N., Kim, J., Kim, K. (2010). Scalable grouping-proof protocol for RFID tags. 2010 Symposium on Cryptography and Information Security (pp. 19\u201322). Japan: Takamatsu."},{"issue":"3\u20134","key":"2676_CR13","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1504\/IJITST.2010.037403","volume":"2","author":"DN Duc","year":"2010","unstructured":"Duc, D. N., Konidala, D. M., Lee, H., & Kim, K. (2010). A survey on RFID security and provably secure grouping-proof protocols. International Journal of Internet Technology and Secured Transactions, 2(3\u20134), 222\u2013249.","journal-title":"International Journal of Internet Technology and Secured Transactions"},{"issue":"3","key":"2676_CR14","first-page":"528","volume":"93","author":"DN Duc","year":"2010","unstructured":"Duc, D. N., & Kim, K. (2010). On the security of RFID group scanning protocols. IEICE Transactions on Information and Systems, 93(3), 528\u2013530.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"2676_CR15","first-page":"1213","volume":"26","author":"N-W Lo","year":"2010","unstructured":"Lo, N.-W., & Yeh, K.-H. (2010). Anonymous coexistence proofs for RFID tags. Journal of Information Science and Engineering, 26, 1213\u20131230.","journal-title":"Journal of Information Science and Engineering"},{"issue":"3","key":"2676_CR16","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.jnca.2010.04.008","volume":"34","author":"P Peris-Lopez","year":"2011","unstructured":"Peris-Lopez, P., Orfila, A., Hernandez-Castro, J., & van der Lubbe, J. C. A. (2011). Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal Network and Computer Applications, 34(3), 833\u2013845.","journal-title":"Journal Network and Computer Applications"},{"issue":"1","key":"2676_CR17","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ijmedinf.2010.10.008","volume":"80","author":"P Peris-Lopez","year":"2011","unstructured":"Peris-Lopez, P., Orfila, A., Mitrokotsa, A., & van der Lubbe, J. C. A. (2011). A comprehensive RFID solution to enhance inpatient medication safety. International Journal of Medical Informatics, 80(1), 13\u201324.","journal-title":"International Journal of Medical Informatics"},{"issue":"6","key":"2676_CR18","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s10916-008-9207-z","volume":"33","author":"H Huang","year":"2009","unstructured":"Huang, H., & Ku, C. (2009). A RFID grouping proof protocol for medication safety of inpatient. Journal Medical Systems, 33(6), 467\u2013474.","journal-title":"Journal Medical Systems"},{"issue":"3","key":"2676_CR19","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10916-009-9373-7","volume":"35","author":"H Chien","year":"2011","unstructured":"Chien, H., Yang, C., Wu, T., & Lee, C. (2011). Two RFID-based solutions to enhance inpatient medication safety. Journal Medical Systems, 35(3), 369\u2013375.","journal-title":"Journal Medical Systems"},{"issue":"23","key":"2676_CR20","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1504\/IJSN.2010.032206","volume":"5","author":"X Leng","year":"2010","unstructured":"Leng, X., Lien, Y., Mayes, K., & Markantonakis, K. (2010). An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks, 5(23), 79\u201386.","journal-title":"International Journal of Security and Networks"},{"issue":"5","key":"2676_CR21","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1080\/18756891.2012.733209","volume":"5","author":"Y-L Liu","year":"2012","unstructured":"Liu, Y.-L., Qin, X.-L., Li, B.-H., & Liu, L. (2012). A forward-secure grouping-proof protocol for multiple RFID tags. International Journal of Computational Intelligence Systems, 5(5), 824\u2013833.","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"2676_CR22","doi-asserted-by":"crossref","unstructured":"Ma, C., Lin, J., Wang, Y., Shang, M. (2012). Offline RFID grouping proofs with trusted timestamps. TRUSTCOM \u201812 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 674\u2013681). Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.212"},{"key":"2676_CR23","unstructured":"Semtech International AG (2006) FCC Regulations for ISM Band Devices: 902\u2013928\u00a0MHz."},{"key":"2676_CR24","doi-asserted-by":"crossref","first-page":"6829","DOI":"10.1016\/j.eswa.2010.12.056","volume":"38","author":"M He","year":"2011","unstructured":"He, M., Horng, S.-J., Fan, P., Khan, M. K., Run, R.-S., Lai, J.-L., & Chen, R.-J. (2011). A fast RFID tag identification algorithm based on counter and stack. Expert Systems with Applications, 38, 6829\u20136838.","journal-title":"Expert Systems with Applications"},{"key":"2676_CR25","unstructured":"International Organization for Standardization (2003) ISO\/IEC 18000-3. Information Technology AIDC Techniques\u2014RFID for Item Management."},{"key":"2676_CR26","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.csi.2007.11.013","volume":"31","author":"P Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2009). LAMED\u2014A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards & Interfaces, 31, 88\u201397.","journal-title":"Computer Standards & Interfaces"},{"key":"2676_CR27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-642-14992-4_4","volume":"6054","author":"J Melia-Segui","year":"2010","unstructured":"Melia-Segui, J., Garcia-Alfaro, J., & Herrera-Joancomarti, J. (2010). Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags. Financial Cryptography and Data Security, 6054, 34\u201346.","journal-title":"Financial Cryptography and Data Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2676-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2676-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2676-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:18:20Z","timestamp":1559380700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2676-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,15]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["2676"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2676-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,15]]}}}