{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:38:08Z","timestamp":1762954688239,"version":"3.33.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T00:00:00Z","timestamp":1177977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1007\/s11390-007-9059-x","type":"journal-article","created":{"date-parts":[[2007,5,31]],"date-time":"2007-05-31T05:29:01Z","timestamp":1180589341000},"page":"438-448","source":"Crossref","is-referenced-by-count":10,"title":["An Anti-Counterfeiting RFID Privacy Protection Protocol"],"prefix":"10.1007","volume":"22","author":[{"given":"Xiaolan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Brian","family":"King","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,5,30]]},"reference":[{"key":"9059_CR1","unstructured":"RFID Technology and EPC in Retail. Symbol Technologies, Inc, 2004."},{"key":"9059_CR2","unstructured":"Wal-Mart details RFID requirement. RFID Journal, 2003."},{"key":"9059_CR3","unstructured":"Gillette confirms RFID purchase. RFID Journal, 2003."},{"key":"9059_CR4","unstructured":"Staake T, Thiesse F, Fleisch E. Extending the EPC network \u2014 The potential of RFID in anti-counterfeiting. In Proc. 2005 ACM Symp. Applied Computing, ACM Press, Santa Fe, USA, 2005, pp. 1607\u20131612."},{"key":"9059_CR5","unstructured":"Yoshida J. Euro bank notes to embed RFID chips by 2005. EE Times, 2001."},{"key":"9059_CR6","unstructured":"Harris G. Tiny antennas to keep tabs on U.S. drugs. New York Times, 2004."},{"key":"9059_CR7","unstructured":"Kanellos M. E-passports to put new face on old documents. CNET News.Com, 2004, http:\/\/news.zdnet.com\/2100-9584_22-5313650.html ."},{"key":"9059_CR8","doi-asserted-by":"crossref","unstructured":"Juels A, Pappu R. Squealing euros: Privacy-protection in RFID-enabled banknotes. In Proc. Financial Cryptography, Gosier, Guadeloupe, FWI, LNCS 2742, Springer-Verlag, 2003, pp. 103\u2013121.","DOI":"10.1007\/978-3-540-45126-6_8"},{"key":"9059_CR9","unstructured":"Biannual Information on the Counterfeiting of the Euro. ECB Press. 2004."},{"key":"9059_CR10","unstructured":"Baard M. Watchdogs push for RFID laws. Wired News, 2004."},{"key":"9059_CR11","doi-asserted-by":"crossref","unstructured":"Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, San Franciso Bay, USA, LNCS 2523, 2002, pp. 454\u2013470.","DOI":"10.1007\/3-540-36400-5_33"},{"key":"9059_CR12","doi-asserted-by":"crossref","unstructured":"Avoine G, Oechslin P. A scalable and provably secure hash based RFID protocol. In Proc. The 2nd IEEE Int. Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, IEEE Computer Society Press, 2005, pp. 110\u2013114.","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"9059_CR13","doi-asserted-by":"crossref","unstructured":"Juels A. Strengthening EPC tags against cloning. In Proc. the 4th ACM Workshop on Wireless Security, New York City, USA, ACM Press, 2005, pp. 67\u201376.","DOI":"10.1145\/1080793.1080805"},{"key":"9059_CR14","doi-asserted-by":"crossref","unstructured":"Juels A. Minimalist cryptography for low-cost RFID tags. In Proc. The Fourth International Conf. Security in Communication Network, Amalfi, Italy, LNCS 3352, Springer-Verlag, 2004, pp. 149\u2013164.","DOI":"10.1007\/978-3-540-30598-9_11"},{"key":"9059_CR15","unstructured":"Ranasinghe D, Engels D, Cole P. Low-cost RFID systems: Confronting security and privacy. In Proc. Auto-ID Labs Research Workshop, Zurich, Switzerland, 2004."},{"key":"9059_CR16","doi-asserted-by":"crossref","unstructured":"Feldhofer M. A proposal for authentication protocol in a security layer for RFID smart tags. In The 12th IEEE Mediterranean Electrotechnical Conf., 2004, 2: 759\u2013762.","DOI":"10.1109\/MELCON.2004.1347041"},{"key":"9059_CR17","first-page":"357","volume-title":"Proc. Workshop on Cryptographic Hardware and Embedded Systems","author":"M Feldhofer","year":"2004","unstructured":"Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Joye M, Quisquater J J (eds.), Cambridge, MA, USA, LNCS 3156, Springer-Verlag, 2004, pp. 357\u2013370."},{"key":"9059_CR18","unstructured":"Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to \u201cprivacy-friendly\u201d tags. In Proc. RFID Privacy Workshop, MIT, MA, USA, 2003."},{"key":"9059_CR19","doi-asserted-by":"crossref","unstructured":"Avoine G, Oechslin P. RFID traceability: A multilayer problem. In Proc. Financial Cryptography, Roseau, Dominica, LNCS 3570, Springer-Verlag, 2005, pp. 125\u2013140.","DOI":"10.1007\/11507840_14"},{"key":"9059_CR20","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proc. the 10th ACM Conf. Computer and Communication Security, ACM Press, 2003, pp. 103\u2013111.","DOI":"10.1145\/948125.948126"},{"key":"9059_CR21","unstructured":"860MHz\u2013930MHz class I radio frequency identification tag: Radio frequency and logical communication interface specification. Technical Report MIT-AUTOID-TR-007, Auto-ID Center, 2002."},{"key":"9059_CR22","unstructured":"Engberg S, Harning M, Damsgaard Jensen C. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proc. The Second Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 2004, 89\u2013101."},{"key":"9059_CR23","first-page":"210","volume-title":"Proc. Conference on Computer and Communications Security","author":"D Molnar","year":"2004","unstructured":"Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. In Proc. Conference on Computer and Communications Security, Washington DC, USA, ACM Press, 2004, pp. 210\u2013219."},{"key":"9059_CR24","unstructured":"Atmel e5561 data sheet. Atmel Corporation. 2003."},{"key":"9059_CR25","unstructured":"Atmel T5557 data sheet. Atmel Corporation. 2003."},{"key":"9059_CR26","unstructured":"Atmel T5552 data sheet. Atmel Corporation. 2003."},{"key":"9059_CR27","doi-asserted-by":"crossref","unstructured":"Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In Proc. CRYPTO\u201999, Santa Barbara, USA, LNCS 1666, Springer-Verlag, 1999, pp. 537\u2013554.","DOI":"10.1007\/3-540-48405-1_34"},{"key":"9059_CR28","doi-asserted-by":"crossref","unstructured":"Avoine G. Privacy issues in RFID banknote protection schemes. In Proc. The 6th International Conference on Smart Card Research and Advanced Applications, Toulouse, France, Kluwer, 2004, pp. 33\u201348.","DOI":"10.1007\/1-4020-8147-2_3"},{"key":"9059_CR29","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curve Cryptography","author":"I Blake","year":"1999","unstructured":"Blake I, Seroussi G, Smart N. Elliptic Curve Cryptography. Cambridge: Cambridge University Press, 1999."},{"key":"9059_CR30","doi-asserted-by":"crossref","unstructured":"Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Proc. ASIACRYPT\u201901, Gold Coast, Australia, LNCS 2139, Springer-Verlag, 2001, pp. 514\u2013532.","DOI":"10.1007\/3-540-45682-1_30"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9059-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9059-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9059-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T20:18:02Z","timestamp":1737058682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9059-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,5]]}},"alternative-id":["9059"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9059-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2007,5]]}}}