{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:27:24Z","timestamp":1725809244672},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_3","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T18:26:21Z","timestamp":1415989581000},"page":"36-53","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags"],"prefix":"10.1007","author":[{"given":"Rui","family":"Figueiredo","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[]},{"given":"Tom\u00e1s","family":"Oliveira e Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"3_CR1","volume-title":"RFID Sourcebook","author":"S Lahiri","year":"2005","unstructured":"Lahiri, S.: RFID Sourcebook. IBM Press, Upper Saddle River (2005)"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3_CR3","unstructured":"International Civil Aviation Organization: Machine Readable Travel Documents, Part 3: Machine Readable Official Travel Documents, Volume 2: Specifications for Electronically Enabled MRtds with Biometric Identification Capability (2008)"},{"key":"3_CR4","unstructured":"BSI: Road transport and traffic telematics - Electronic fee collection - Interoperability application profile for DSRC. BS EN 15509:2007 (2007). ISBN 978-0-580-50884-4"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"European Commission, Directorate-General for Mobility and Transport: The European Electronic Toll Service (EETS): Guide For the Application of the Directive on the Interoperability of Electronic Road Toll Systems (2011). ISBN 978-92-79-18637-0, doi: 10.2833\/6832 , http:\/\/ec.europa.eu\/transport\/publications\/doc\/2011-eets-european-electronic-toll-service_en.pdf","DOI":"10.2833\/6832"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"3_CR7","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004\/199 (2004)"},{"key":"3_CR8","unstructured":"Klima, V.: Finding MD5 Collisions - a Toy For a Notebook. Cryptology ePrint Archive, Report 2005\/075 (2005). http:\/\/eprint.iacr.org\/2005\/075"},{"key":"3_CR9","unstructured":"Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006\/105 (2006). http:\/\/eprint.iacr.org\/2006\/105"},{"key":"3_CR10","unstructured":"Dimitriou, T.: A Lightweight RFID protocol to protect against traceability and cloning attacks. In: 1st IEEE\/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), Athens, Greece (2005)"},{"key":"3_CR11","unstructured":"Bureau of Transportation Statistics (BTS): Table 1\u201311: Number of U.S. Aircraft, Vehicles, Vessels, and Other Conveyances. http:\/\/www.bts.gov\/publications\/national_transportation_statistics\/html\/table_01_11.html"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: 1st International Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany (2003)","DOI":"10.1007\/978-3-540-39881-3_18"},{"issue":"7","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1016\/j.comcom.2009.03.006","volume":"32","author":"AX Liu","year":"2009","unstructured":"Liu, A.X., Bailey, L.A.: PAP: a privacy and authentication protocol for passive RFID tags. Comput. Commun. 32(7), 1194\u20131199 (2009)","journal-title":"Comput. Commun."},{"key":"3_CR14","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, MIT (2003)"},{"key":"3_CR15","unstructured":"Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID Protocol. In: 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2005), Kauai Island, Hawaii, USA (2005)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P.: Providing security and privacy in RFID systems using triggered hash chains. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201908), Hong Kong (2008)","DOI":"10.1109\/PERCOM.2008.67"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Lim, T.L., Li, T., Gu, T.: Secure RFID identification and authentication with triggered hash chain variants. In: 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS\u201908), Melbourne, Victoria, Australia (2008)","DOI":"10.1109\/ICPADS.2008.46"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, USA (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11693383_19","volume-title":"Selected Areas in Cryptography","author":"D Molnar","year":"2006","unstructured":"Molnar, D., Soppera, A., Wagner, D.: A Scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276\u2013290. Springer, Heidelberg (2006)"},{"key":"3_CR20","unstructured":"Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201906), Pisa, Italy (2006)"},{"key":"3_CR21","unstructured":"Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication - a review of RFID product authentication techniques. In: Workshop on RFID Security (RFIDSec 06), Graz, Austria (2006)"},{"issue":"6","key":"3_CR22","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s00779-008-0213-4","volume":"13","author":"M Langheinrich","year":"2009","unstructured":"Langheinrich, M.: A survey of RFID privacy approaches. Pers. Ubiquit. Comput. 13(6), 413\u2013421 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935308_1","volume-title":"Information and Communications Security","author":"CH Lim","year":"2006","unstructured":"Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"3_CR24","unstructured":"BSI: Road transport and traffic telematics - Dedicated short range communication (DSRC) - DSRC data link layer - Medium access and logical link control. BS EN 12795 (2003). ISBN 0-580-41964-9"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-642-16822-2_13","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"G Avoine","year":"2010","unstructured":"Avoine, G., Coisel, I., Martin, T.: Time measurement threatens privacy-friendly RFID authentication protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 138\u2013157. Springer, Heidelberg (2010)"},{"key":"3_CR26","volume-title":"CUDA by Example: An Introduction to General-Purpose GPU Programming","author":"J Sanders","year":"2010","unstructured":"Sanders, J., Kandrot, E.: CUDA by Example: An Introduction to General-Purpose GPU Programming. Addison-Wesley, Reading (2010)"},{"key":"3_CR27","volume-title":"Programming Massively Parallel Processors: A Hands-on Approach","author":"DB Kirk","year":"2010","unstructured":"Kirk, D.B., Hwu, W.-M.W.: Programming Massively Parallel Processors: A Hands-on Approach. Morgan Kaufmann, Burlington (2010)"},{"key":"3_CR28","unstructured":"NVidia: NVidia Tesla 1U Computing System. http:\/\/www.nvidia.com\/docs\/IO\/43395\/NV_DS_Tesla_S1070_US_Jun08_NV_LR_Final.pdf"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T08:10:56Z","timestamp":1650615056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}