{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:03Z","timestamp":1743739563591,"version":"3.40.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11633-012-0642-4","type":"journal-article","created":{"date-parts":[[2012,7,6]],"date-time":"2012-07-06T06:10:05Z","timestamp":1341555005000},"page":"257-265","source":"Crossref","is-referenced-by-count":2,"title":["An efficient and secure authentication protocol for RFID systems"],"prefix":"10.1007","volume":"9","author":[{"given":"Md. Monzur","family":"Morshed","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Atkins","sequence":"additional","affiliation":[]},{"given":"Hong-Nian","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,7]]},"reference":[{"issue":"3","key":"642_CR1","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S. L. Garfinkel","year":"2005","unstructured":"S. L. Garfinkel, A. Jules, R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, vol. 3, no. 3, pp. 34\u201343, 2005.","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"642_CR2","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Jules","year":"2006","unstructured":"A. Jules. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, vol. 24, no. 2, pp. 381\u2013394, 2006.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"unstructured":"EPCglobal Web site, 2005. [Online], Available: http:\/\/www.EPCglobalinc.org , February 16, 2012.","key":"642_CR3"},{"key":"642_CR4","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/11424758_65","volume":"3480","author":"S. M. Lee","year":"2005","unstructured":"S. M. Lee, Y. J. Hwang, D. H. Lee, J. I. Lim. Efficient authentication for low-cost RFID systems. In Proceedings of the 2005 International Conference on Computational Science and its Applications, ACM, Berlin, Germany, vol. 3480, pp. 619\u2013627, 2005.","journal-title":"Proceedings of the 2005 International Conference on Computational Science and its Applications"},{"issue":"1","key":"642_CR5","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"R. Want","year":"2006","unstructured":"R. Want. An introduction to RFID technology. IEEE Pervasive Computing, vol. 5, no. 1, pp. 25\u201333, 2006.","journal-title":"IEEE Pervasive Computing"},{"unstructured":"B. S. Prabhu, X. Su, H. Ramamurthy, C. Chu, R. Gadh. WinRFID \u2014 A Middleware for the Enablement of Radio Frequency Identification (RFID) Based Applications. [Online], Available: http:\/\/www.techrepublic.com\/whitepapers\/winrfid-a-middleware-for-the-enablement-ofradio-frequency-identification\/2349745 , February 19, 2012.","key":"642_CR6"},{"doi-asserted-by":"crossref","unstructured":"D. Henrici, P. Muller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, IEEE, Orlando, USA, pp. 149\u2013153, 2004.","key":"642_CR7","DOI":"10.1109\/PERCOMW.2004.1276922"},{"doi-asserted-by":"crossref","unstructured":"D. Molnar, D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of Conference on Computer and Communications Security, ACM, Washington, USA, pp. 210\u2013219, 2004.","key":"642_CR8","DOI":"10.1145\/1030083.1030112"},{"issue":"3","key":"642_CR9","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","volume":"3450","author":"K. Rhee","year":"2005","unstructured":"K. Rhee, J. Kwak, S. Kim, D. Won. Challengeresponse based RFID authentication protocol for distributed database environmnet. In Proceedings of International Conference on Security in Pervasive Computing, Mendeley, Boppard, Germany, vol. 3450, no. 3, pp. 70\u201384, 2005.","journal-title":"Proceedings of International Conference on Security in Pervasive Computing"},{"key":"642_CR10","first-page":"945","volume":"3832","author":"E. Y. Choi","year":"2005","unstructured":"E. Y. Choi, S. M. Lee, D. H. Lee. Efficient RFID authentication protocol for ubiquitous computing environment. In Proceedings of Embedded and Ubiquitous Computing, vol. 3832, pp. 945\u2013954, 2005.","journal-title":"Proceedings of Embedded and Ubiquitous Computing"},{"issue":"2","key":"642_CR11","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","volume":"29","author":"H. Chien","year":"2007","unstructured":"H. Chien, C. Chen. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, vol. 29, no. 2, pp. 254\u2013259, 2007.","journal-title":"Computer Standards & Interfaces"},{"unstructured":"M. Ohkubo, K. Suzki, S. Kinoshita. Cryptographic approach to \u201cprivacy-friendly\u201d tags. [Online], Available: http:\/\/rfidprivacy.media.mit.edu\/2003\/papers\/ohkubo.pdf , February 17, 2012.","key":"642_CR12"},{"doi-asserted-by":"crossref","unstructured":"T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, IEEE, Athens, Greece, pp. 59\u201366, 2005.","key":"642_CR13","DOI":"10.1109\/SECURECOMM.2005.4"},{"unstructured":"M. E. Hoque, F. Rahman, S. I. Ahamed. Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. In Proceedings of the 2009 ACM Symposium on Applied Computing, ACM, Honlulu, USA, pp. 1062\u20131066, 2009.","key":"642_CR14"},{"key":"642_CR15","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1007\/978-3-540-77018-3_57","volume":"4819","author":"J. Ha","year":"2007","unstructured":"J. Ha, S. Moon, J. M. G. Nieto, C. Boyd. Security analysis and enhancement of one-way hash based low-cost authentication protocol. In Proceedings of the 2007 International Conference on Emerging Technologies in Knowledge Discovery and Data Mining, ACM, Berlin, Germany, vol. 4819, pp. 574\u2013583, 2007.","journal-title":"Proceedings of the 2007 International Conference on Emerging Technologies in Knowledge Discovery and Data Mining"},{"doi-asserted-by":"crossref","unstructured":"B. Song, C. J. Mitchell. RFID authentication protocol for low-cost tags. In Proceedings of the 1st ACM Conference on Wireless Network Security, ACM, New York, USA, pp. 140\u2013147, 2008.","key":"642_CR16","DOI":"10.1145\/1352533.1352556"},{"unstructured":"B. Song. RFID Tag Ownership Transfer. In Proceedings of the 4th Workshop on RFID Security, Budaperst, Hungary, 2008. [Online], Available: http:\/\/events.iaik.tugraz.at\/RFIDSec08\/Papers\/Publication\/ 15 February 19, 2012.","key":"642_CR17"},{"key":"642_CR18","first-page":"52","volume":"2248","author":"N. J. Hopper","year":"2001","unstructured":"N. J. Hopper, M. Blum. Secure human identification protocols. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ACM, London, UK, vol. 2248, pp. 52\u201366, 2001.","journal-title":"Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology"},{"unstructured":"A. Juels, S. Weis. Authenticating pervasive devices with human protocols. [Online], Available: http:\/\/www.iacr.org\/cryptodb\/archive\/2005\/CRYPTO\/1478\/1478.pdf , February 17, 2012.","key":"642_CR19"},{"issue":"21","key":"642_CR20","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1049\/el:20052622","volume":"41","author":"H. Gilbert","year":"2005","unstructured":"H. Gilbert, M. Robshaw, H. Sibert. Active attack against HB+: A provably secure lightweight authentication protocol. Electronics Letters, vol. 41, no. 21, pp. 1169\u20131170, 2005.","journal-title":"Electronics Letters"},{"unstructured":"J. Katz, J. S. Shin. Parallel and concurrent security of the HB and HB+ protocols. Cryptology ePrint archive, Report 2005\/461, 2005. [Online], Available: http:\/\/eprint.iacr.org , February 17, 2012.","key":"642_CR21"},{"doi-asserted-by":"crossref","unstructured":"J. Bringer, H. Chabanne, E. Dottax. HB++: A lightweight authentication protocol secure against some attacks. In Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, IEEE, pp. 28\u201333, 2006.","key":"642_CR22","DOI":"10.1109\/SECPERU.2006.10"},{"unstructured":"S. Piramuthu. HB and related lightweight authentication protocols for secure RFID tag\/reader authentication. In Proceedings of CollECTeR Europe Conference, Basel, Switzerland, 2006. [Online], Available: http:\/\/www.avoine.net\/rfid\/download\/papers\/Piramuthu-2006-collecter.pdf , February 19, 2012.","key":"642_CR23"},{"issue":"9","key":"642_CR24","doi-asserted-by":"crossref","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"J. Munilla, A. Peinado. HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, vol. 51, no. 9, pp. 2262\u20132267, 2007.","journal-title":"Computer Networks"},{"key":"642_CR25","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1996","unstructured":"A. J. Menezes, P. C. Oorshot, S. A. Vanstone. Handbook of Applied Cryptography, chapter 19, Boca Raton, USA: CRC Press, 1996."},{"doi-asserted-by":"crossref","unstructured":"G. Tsudik. YA-TRAP: Yet another trivial RFID authentication protocol. In Proceedings of the 4th IEEE Annual Conference on Pervasive Computing and Communications, Pisa, Italy, pp. 640\u2013643, 2006.","key":"642_CR26","DOI":"10.1109\/PERCOMW.2006.152"},{"doi-asserted-by":"crossref","unstructured":"G. Tsudik. A family of dunces: Trivial RFID identification and authentication protocols. In Proceedings of the 7th International Conference on Privacy Enhancing Technologies pp. 45\u201361, 2007.","key":"642_CR27","DOI":"10.1007\/978-3-540-75551-7_4"},{"unstructured":"B. Lee, H. Kim. Ubiquitous RFID based medical application and the security architecture in smart hospitals. In Proceedings of the 2007 International Conference on Convergence Information Technology, ACM, Washington, USA, pp. 2359\u20132362, 2007.","key":"642_CR28"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0642-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-012-0642-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0642-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T09:32:10Z","timestamp":1743672730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-012-0642-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["642"],"URL":"https:\/\/doi.org\/10.1007\/s11633-012-0642-4","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}