{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T04:37:17Z","timestamp":1648528637363},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T00:00:00Z","timestamp":1493251200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11277-017-4225-0","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T15:23:03Z","timestamp":1493306583000},"page":"1083-1098","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of the Qian et al. Protocol: A Revised Tree-LSHB+\u00a0Protocol"],"prefix":"10.1007","volume":"96","author":[{"given":"Miao","family":"Lei","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenlong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongxun","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"issue":"4","key":"4225_CR1","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1007\/s11277-014-1699-x","volume":"77","author":"X Qian","year":"2014","unstructured":"Qian, X., Liu, X., Yang, S., & Zuo, C. (2014). Security and privacy analysis of Tree-LSHB+\u00a0protocol. Wireless Personal Communications, 77(4), 3125\u20133141. doi: 10.1007\/s11277-014-1699-x .","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"4225_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-013-1006-2","volume":"72","author":"G Deng","year":"2013","unstructured":"Deng, G., Li, H., Zhang, Y., & Wang, J. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159\u2013174. doi: 10.1007\/s11277-013-1006-2 .","journal-title":"Wireless Personal Communications"},{"key":"4225_CR3","doi-asserted-by":"crossref","unstructured":"Hopper, N. J., & Blum, M. (2000). A secure human\u2013computer authentication scheme. Technical report CMU-CS-00-139, Computer Science Department, Carnegie Mellon University, Paper 148.","DOI":"10.21236\/ADA382135"},{"key":"4225_CR4","first-page":"293","volume":"3621","author":"A Juels","year":"2005","unstructured":"Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human. Protocols Crypto 2005 LNCS, 3621, 293\u2013308.","journal-title":"Protocols Crypto 2005 LNCS"},{"key":"4225_CR5","unstructured":"Gilbert, H., Robshaw, M., & Silbert, H. (2005). An Active attack against HB+\u2014A provably secure lightweight authentication protocol. Cryptology ePrint archive, report 2005\/237. http:\/\/eprint.iacr.org\/2005\/237 ."},{"key":"4225_CR6","doi-asserted-by":"crossref","unstructured":"BRINGER, J., Chabanne, H., & Dottax, E. (2006). HB++: A lightweight authentication protocol secure against some attacks. Proceedings of the second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU\u201906).","DOI":"10.1109\/SECPERU.2006.10"},{"issue":"9","key":"4225_CR7","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J Munilla","year":"2007","unstructured":"Munilla, J., & Peinado, A. (2007). HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, 51(9), 2262\u20132267. doi: 10.1016\/j.comnet.2007.01.011 .","journal-title":"Computer Networks"},{"key":"4225_CR8","unstructured":"Leng, X., Mayes, K., & Markantonakis, K. (2008). HB-MP+ protocol: An improvement on the HB-MP protocol. IEEE international conference on RFID, 118\u2013124."},{"issue":"3","key":"4225_CR9","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1016\/j.dss.2007.01.003","volume":"43","author":"S Piramuthu","year":"2007","unstructured":"Piramuthu, S. (2007). Protocols for RFID tag\/reader authentication. Decision Support Systems, 43(3), 897\u2013914. doi: 10.1016\/j.dss.2007.01.003 .","journal-title":"Decision Support Systems"},{"key":"4225_CR10","first-page":"186","volume":"2009","author":"B Yoon","year":"2009","unstructured":"Yoon, B., Sung, M. Y., Yeon, S., Oh, H. S., Kwon, Y., Kim, C., et al. (2009). HB-MP++ protocol: An ultra light-weight authentication protocol for RFID system. IEEE International Conference on RFID, 2009, 186\u2013191.","journal-title":"IEEE International Conference on RFID"},{"key":"4225_CR11","doi-asserted-by":"publisher","DOI":"10.7763\/jacn.2013.v1.13","author":"Z Lin","year":"2013","unstructured":"Lin, Z., & Song, J. S. (2013). An improvement in HB-family lightweight authentication protocols for practical use of RFID system. Journal of Advances in Computer Networks. doi: 10.7763\/jacn.2013.v1.13 .","journal-title":"Journal of Advances in Computer Networks"},{"key":"4225_CR12","first-page":"361","volume":"2008","author":"H Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M. J. B., & Seurin, Y. (2008). HB#: Increasing the security and efficiency of HB+. EUROCRYPT, 2008, 361\u2013387.","journal-title":"EUROCRYPT"},{"key":"4225_CR13","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume":"5350","author":"K Ouafi","year":"2008","unstructured":"Ouafi, K., Overbeck, R., & Vaudenay, S. (2008). On the security of HB# against a man-in-the-middle attack. ASIACRYPT 2008 LNCS, 5350, 108\u2013124.","journal-title":"ASIACRYPT 2008 LNCS"},{"key":"4225_CR14","unstructured":"Bringer, J., & Chabanne, H. (2008). Trusted-HB: A low-cost version of HB+ secure against man-in-the-middle attacks. CoRR, http:\/\/arxiv.org\/abs\/0802.0603v1 ."},{"key":"4225_CR15","doi-asserted-by":"crossref","unstructured":"Madhavan, M., Thangaraj, A., Viswanathan, K., & Sankarasubramaniam, Y. (2010). NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions. Proceedings of IEEE international symposium on information theory (pp. 2498\u20132502).","DOI":"10.1109\/NCC.2010.5430152"},{"key":"4225_CR16","doi-asserted-by":"crossref","unstructured":"Abyaneh, M. R. S. (2010). On the security of non-linear HB (NLHB) protocol against passive attack. Proceedings of IEEE\/IFIP international conference on embedded and ubiquitous computing (pp. 523\u2013528).","DOI":"10.1109\/EUC.2010.86"},{"issue":"3","key":"4225_CR17","first-page":"1151","volume":"41","author":"SA Ali","year":"2013","unstructured":"Ali, S. A., & Hardan, M. (2013). Variants of HB protocols for RFID security. Journal of Engineering Sciences, 41(3), 1151\u20131174.","journal-title":"Journal of Engineering Sciences"},{"key":"4225_CR18","unstructured":"Bosley, C., Haralambiev, K., & Nicolosi, A. (2011). HBN: An HB-like protocol secure against man-in-the-middle attacks. Cryptology ePrint archive, report 2011\/350."},{"key":"4225_CR19","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/icebe.2012.33","volume":"2012","author":"F Hou","year":"2012","unstructured":"Hou, F., Yang, C., Liu, J., Zhang, Y., Tian, J., & Zhang, Y. (2012). HB-MAP protocol: A new secure bidirectional light-wight authentication protocol of HB. Ninth IEEE International Conference on e-Business Engineering, 2012, 151\u2013155. doi: 10.1109\/icebe.2012.33 .","journal-title":"Ninth IEEE International Conference on e-Business Engineering"},{"key":"4225_CR20","doi-asserted-by":"publisher","unstructured":"Rizomiliotis, P., & Gritzalis, S. (2012). GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol. 10th international conference, ACNS 2012, Singapore, June 26\u201329, 2012. Proceedings (Vol. 7341, pp 489\u2013506). doi: 10.1007\/978-3-642-31284-7_29 .","DOI":"10.1007\/978-3-642-31284-7_29"},{"issue":"6","key":"4225_CR21","doi-asserted-by":"crossref","first-page":"4042","DOI":"10.1109\/TIT.2013.2253892","volume":"59","author":"Z Li","year":"2013","unstructured":"Li, Z., Gong, G., & Qin, Z. (2013). Secure and efficient LCMQ entity authentication protocol.pdf>. IEEE Transactions on Information Theory, 59(6), 4042\u20134054.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"4225_CR22","doi-asserted-by":"crossref","first-page":"343","DOI":"10.3233\/JCS-2010-0404","volume":"19","author":"T Halevi","year":"2011","unstructured":"Halevi, T., Saxena, N., & Halevi, S. (2011). Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security, 19(2), 343\u2013363.","journal-title":"Journal of Computer Security"},{"key":"4225_CR23","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"ER Berlekamp","year":"1978","unstructured":"Berlekamp, E. R., McEliece, R. J., & Tilborg, H. C. A. V. (1978). On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24, 384\u2013386.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4225_CR24","first-page":"506","volume":"50","author":"A Blum","year":"2003","unstructured":"Blum, A., Kalai, A., & Wasserman, H. (2003). Noise-tolerant learning, the parity problem, and the statistical query model. ACM, 50, 506\u2013519.","journal-title":"ACM"},{"key":"4225_CR25","unstructured":"Fossorier, M. P. C., Mihaljevi\u0107, M. J., Imai, H., Cui, Y., & Matsuura, K. (2006). A novel algorithm for solving the LPN problem and its application to security evaluation of the HB protocol for RFID authentication. Cryptology ePrint Archive, Report 2006\/197."},{"key":"4225_CR26","unstructured":"Kirchner, P. (2011). Improved generalized birthday attack. Cryptology ePrint Archive, Report 2011\/377. http:\/\/eprint.iacr.org\/2011\/377 ."},{"issue":"5\u20136","key":"4225_CR27","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.parco.2014.04.002","volume":"40","author":"I Teixid\u00f3","year":"2014","unstructured":"Teixid\u00f3, I., Seb\u00e9, F., Conde, J., & Solsona, F. (2014). MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment. Parallel Computing, 40(5\u20136), 100\u2013112. doi: 10.1016\/j.parco.2014.04.002 .","journal-title":"Parallel Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4225-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4225-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4225-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,22]],"date-time":"2019-09-22T05:04:51Z","timestamp":1569128691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4225-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,27]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["4225"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4225-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,27]]}}}