{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:07:19Z","timestamp":1729609639252,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596037","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"61-68","source":"Crossref","is-referenced-by-count":6,"title":["Traceability analysis of quadratic residue-based RFID authentication protocols"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Sohrabi-Bonab","sequence":"first","affiliation":[]},{"given":"Mahdi R.","family":"Alagheband","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_29"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368352"},{"key":"18","first-page":"118","article-title":"A new framework for rfid privacy","volume":"6345","author":"deng","year":"2010","journal-title":"15th European Symposium on Research in Computer Security ESORICS 2010 LNCS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_19"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"14","article-title":"Untangling RFID privacy models","author":"coisel","year":"2011","journal-title":"Cryptology ePrint Archive"},{"key":"11","article-title":"Privacy-preserving rfid systems: Model and constructions","author":"canard","year":"2010","journal-title":"Cryptology ePrint Archive"},{"key":"12","article-title":"Adversary model for radio frequency identification","author":"avoine","year":"2005","journal-title":"Swiss Federal Institute of Technology (EPFL) Security and Cryptography Laboratory (LASEC)"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Introduction to Modern Cryptography"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-010-0001-0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.016"},{"key":"23","doi-asserted-by":"crossref","first-page":"337341","DOI":"10.1016\/j.comcom.2010.05.011","article-title":"Improvement of the RFID authentication scheme based on quadratic residues","volume":"34","author":"yeh","year":"2011","journal-title":"Computer Communications"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_6"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.018"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.06.015"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514282"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s11139-011-9343-9"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"10","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","article-title":"A new rfid privacy model","volume":"6879","author":"hermans","year":"2011","journal-title":"Proc Eur Symp Research in Computer Security (ESORICS 2011) LNCS"},{"journal-title":"Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting","year":"2007","author":"cole","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.001"},{"key":"6","article-title":"Unified privacy analysis of newfound rfid authentication protocols","author":"alagheband","year":"2012","journal-title":"Security and Communication Networks"},{"key":"5","article-title":"Privacyfriendly authentication in rfid systems: On sub-linear protocols based on symmetric-key cryptography","author":"avoine","year":"2012","journal-title":"IEEE Trans Mobile Computing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462153"},{"key":"9","first-page":"31620","article-title":"Cryptanalysis of a new ultralightweight rfid authentication protocol-sasi","volume":"6","author":"phan","year":"2008","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"8","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-642-25578-6_17","article-title":"Addressing flaws in rfid authentication protocols","volume":"7107","author":"habibi","year":"2011","journal-title":"Progress in CryptologyINDOCRYPT 2011 LNCS"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596037.pdf?arnumber=6596037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T07:21:24Z","timestamp":1563952884000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596037","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}