{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T15:50:28Z","timestamp":1707839428791},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Commun. Inf. Netw."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s41650-017-0013-y","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T11:59:02Z","timestamp":1498651142000},"page":"107-122","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis and improvement of two new RFID protocols based on R-RAPSE"],"prefix":"10.23919","volume":"2","author":[{"given":"Seyed Salman Sajjadi","family":"GhaemMaghami","sequence":"first","affiliation":[]},{"given":"Afrooz","family":"Haghbin","sequence":"additional","affiliation":[]},{"given":"Mahtab","family":"Mirmohseni","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"key":"13_CR1","first-page":"5","volume-title":"Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things [C]\/\/The 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV","author":"T. Yu","year":"2015","unstructured":"T. Yu, V. Sekar, S. Seshan, et al. Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things [C]\/\/The 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, Philadelphia, USA, 2015: 5."},{"issue":"1","key":"13_CR2","first-page":"27","volume":"46","author":"K. Baghery","year":"2014","unstructured":"K. Baghery, B. Abdolmaleki, M. Emadi. Game-based cryptanalysis of a lightweight crc-based authentication protocol for EPC tags [J]. Amirkabir international journal of electrical & electronics engineering, 2014, 46(1): 27\u201336.","journal-title":"Amirkabir international journal of electrical & electronics engineering"},{"key":"13_CR3","first-page":"265","volume-title":"On the leakage of information in biometric authentication [C]\/\/The 15th International Conference on Cryptology in India","author":"E. Pagnin","year":"2014","unstructured":"E. Pagnin, C. Dimitrakakis, A. Abidin, et al. On the leakage of information in biometric authentication [C]\/\/The 15th International Conference on Cryptology in India, New Delhi, India, 2014:265\u2013280."},{"issue":"12","key":"13_CR4","doi-asserted-by":"crossref","first-page":"7678","DOI":"10.1016\/j.eswa.2010.04.074","volume":"37","author":"T. C. Yeh","year":"2010","unstructured":"T. C. Yeh, Y. J. Wang, T. C. Kuo, et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard [J]. Expert systems with applications, 2010, 37(12): 7678\u20137683.","journal-title":"Expert systems with applications"},{"key":"13_CR5","unstructured":"S. S. S. Ghaemmaghami, M. Mirmohseni, A. Haghbin. A privacy preserving improvement for SRTA in telecare systems [J]. arXiv: 1510.04197."},{"key":"13_CR6","volume-title":"Cryptography in radio frequency identification and fair exchange protocols [D]. Institut De Systemes De Communication Section Des Systemes De Communication ECole Polytechnique FEDERale De Lausanne Pour LObtention Du Grade De Docteures Sciences Par Gildas A","author":"G. Avoine","year":"2005","unstructured":"G. Avoine. Cryptography in radio frequency identification and fair exchange protocols [D]. Institut De Systemes De Communication Section Des Systemes De Communication ECole Polytechnique FEDERale De Lausanne Pour LObtention Du Grade De Docteures Sciences Par Gildas Avoine Dea DIntelligence Artificielle Et Algorithmique, Universit\u00b4e de Caen Basse-Normandie, France, 2005."},{"issue":"2","key":"13_CR7","first-page":"99","volume":"8","author":"S. S. Ghaemmaghami","year":"2016","unstructured":"S. S. Ghaemmaghami, A. Haghbin, M. Mirmohseni. Traceability improvements of a new RFID protocol based on EPC C1 G2 [J]. The ISC international journal of information security, 2016, 8(2): 99\u2013109.","journal-title":"The ISC international journal of information security"},{"key":"13_CR8","volume-title":"HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding [C]\/\/The 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","author":"E. Pagnin","year":"2015","unstructured":"E. Pagnin, A. J. Yang, G. Hancke, et al. HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding [C]\/\/The 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, USA, 2015. 3."},{"issue":"4","key":"13_CR9","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H. Y. Chien","year":"2007","unstructured":"H. Y. Chien. Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J]. IEEE transactions on dependable and secure computing, 2007, 4(4): 337\u2013340.","journal-title":"IEEE transactions on dependable and secure computing"},{"key":"13_CR10","first-page":"317","volume-title":"Public-key cryptography for RFID tags and applications [C]\/\/RFID Security","author":"L. Batina","year":"2008","unstructured":"L. Batina, J. Guajardo, B. Preneel, et al. Public-key cryptography for RFID tags and applications [C]\/\/RFID Security, Springer, 2008:317\u2013348."},{"key":"13_CR11","first-page":"114","volume-title":"Ultras: ultra-lightweight RFID authentication scheme for mobile device [C]\/\/International Conference on Wireless Algo-rithms, Systems, and Applications","author":"K. Fan","year":"2015","unstructured":"K. Fan, N. Ge, Y. Gong, et al. Ultras: ultra-lightweight RFID authentication scheme for mobile device [C]\/\/International Conference on Wireless Algo-rithms, Systems, and Applications, Qufu, China, 2015:114\u2013122."},{"issue":"1","key":"13_CR12","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1016\/j.eswa.2011.07.053","volume":"39","author":"E. J. Yoon","year":"2012","unstructured":"E. J. Yoon. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard [J]. Expert systems with applications, 2012, 39(1): 1589\u20131594.","journal-title":"Expert systems with applications"},{"issue":"3","key":"13_CR13","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.comcom.2010.02.029","volume":"34","author":"J. S. Cho","year":"2011","unstructured":"J. S. Cho, S. S. Yeo, S. K. Kim. Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value [J]. Computer communications, 2011, 34(3): 391\u2013397.","journal-title":"Computer communications"},{"issue":"1","key":"13_CR14","first-page":"28","volume":"9","author":"Q. Cai","year":"2014","unstructured":"Q. Cai, Y. Zhan, J. Yang. The improvement of RFID authentication protocols based on R-RAPSE [J]. Journal of networks, 2014, 9(1): 28\u201335.","journal-title":"Journal of networks"},{"key":"13_CR15","first-page":"1","volume-title":"Strong and robust RFID authentication enabling perfect ownership transfer [C]\/\/The 8th International Conference on Information and Communications Security","author":"C. H. Lim","year":"2006","unstructured":"C. H. Lim, T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer [C]\/\/The 8th International Conference on Information and Communications Security, Raleigh, USA, 2006. 1\u201320."},{"key":"13_CR16","first-page":"68","volume-title":"On privacy models for RFID [C]\/\/The 13th International Conference on the Theory and Application of Cryptology and Information Security","author":"S. Vaudenay","year":"2007","unstructured":"S. Vaudenay. On privacy models for RFID [C]\/\/The 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, 2007:68\u201387."},{"key":"13_CR17","first-page":"263","volume-title":"Privacy of recent RFID au-thentication protocols [C]\/\/Information Security Practice and Experience","author":"K. Ouafi","year":"2008","unstructured":"K. Ouafi, R. C. W. Phan. Privacy of recent RFID au-thentication protocols [C]\/\/Information Security Practice and Experience, Springer, 2008:263\u2013277."},{"key":"13_CR18","volume-title":"ACM transactions on information and system security","author":"A. Juels","year":"2009","unstructured":"A. Juels, S. A. Weis. Defining strong privacy for RFID [J]. ACM transactions on information and system security, 2009. 13(1): 7."},{"issue":"10","key":"13_CR19","doi-asserted-by":"crossref","first-page":"2397","DOI":"10.1109\/TMC.2013.161","volume":"13","author":"G. Avoine","year":"2014","unstructured":"G. Avoine, I. Coisel, T. Martin. Untraceability model for RFID [J]. IEEE transactions on mobile computing, 2014, 13(10): 2397\u20132405.","journal-title":"IEEE transactions on mobile computing"},{"issue":"1","key":"13_CR20","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1587\/transfun.E97.A.225","volume":"97","author":"D. Moriyama","year":"2014","unstructured":"D. Moriyama, S. Matsuo, M. Ohkubo. Relations among notions of privacy for RFID authentication protocols [J]. IEICE transactions on fundamentals of electronics, communications and computer sciences, 2014, 97(1): 225\u2013235.","journal-title":"IEICE transactions on fundamentals of electronics, communications and computer sciences"},{"key":"13_CR21","first-page":"49","volume-title":"IACR Cryptology ePrint Archive","author":"G. Avoine","year":"2005","unstructured":"G. Avoine. Adversarial model for radio frequency identification [Z]. IACR Cryptology ePrint Archive, 2005. 49."}],"container-title":["Journal of Communications and Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41650-017-0013-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41650-017-0013-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41650-017-0013-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T12:12:03Z","timestamp":1656072723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41650-017-0013-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["13"],"URL":"https:\/\/doi.org\/10.1007\/s41650-017-0013-y","relation":{},"ISSN":["2096-1081","2509-3312"],"issn-type":[{"value":"2096-1081","type":"print"},{"value":"2509-3312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,28]]}}}