{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T21:56:16Z","timestamp":1770414976424,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750160","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"44-51","source":"Crossref","is-referenced-by-count":2,"title":["A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Abughazalah","sequence":"first","affiliation":[]},{"given":"Kostantinos","family":"Markantonakis","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"The aVISPA tool for the automated validation of internet security protocols and applications","author":"armando","year":"2005","journal-title":"Computer Aided Verification"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.014"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596779"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/32.637148"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.053"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29889-9_7"},{"key":"13","author":"weis","year":"2003","journal-title":"Security and privacy in radio-frequency identification devices"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.074"},{"key":"11","first-page":"50","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2004","journal-title":"Security in Pervasive Computing"},{"key":"12","article-title":"Cryptographic approach to Privacy-friendly\" tags","volume":"82","author":"ohkubo","year":"2003","journal-title":"RFID Privacy Workshop"},{"key":"21","author":"song","year":"2009","journal-title":"RFID Authentication Protocols Using Symmetric Cryptography"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2006.180"},{"key":"22","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/11693383_20","article-title":"Reducing time complexity in rFID systems","author":"avoine","year":"2006","journal-title":"Selected Areas in Cryptography"},{"key":"23","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1145\/1030083.1030112","article-title":"Privacy and security in library rFID issues, practices, and architectures","author":"molnar","year":"2004","journal-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security ACM"},{"key":"24","first-page":"6","article-title":"LMAP a real lightweight mutual authentication protocol for low-cost rFID tags","author":"peris-lopez","year":"2006","journal-title":"Proc of 2nd Workshop on RFID Security"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402511"},{"key":"26","first-page":"22","article-title":"The shrinking generator","volume":"773","author":"coppersmith","year":"1993","journal-title":"Advances in Cryptology-CRYPTO '93 13th Annual International Cryptology Conference Santa Barbara California USA August 22-26 1993 Proceedings Ser Lecture Notes in Computer Science"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514282"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.082117"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_8"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.5120\/3148-4352"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.83"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"30","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-642-25578-6_17","article-title":"Addressing flaws in rFID authentication protocols","author":"habibi","year":"2011","journal-title":"Progress in Cryptology-INDOCRYPT 2011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352556"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_8"},{"key":"32","first-page":"147","article-title":"Breaking and fixing the needham-Schroeder public-key protocol using fDR","author":"lowe","year":"1996","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271509"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_4"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICLSIM.2010.5461250"},{"key":"9","article-title":"Enhancing security of ePCglobal gen-2 rFID against traceability and cloning","author":"duc","year":"2006","journal-title":"Symposium on Cryptography and Information Security the Institute of Electronics Information and Communication Engineers"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.004"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"London, United Kingdom","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750160.pdf?arnumber=6750160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T11:55:39Z","timestamp":1716638139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750160","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}