{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:13:02Z","timestamp":1759133582429,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/rfid-ta.2015.7379806","type":"proceedings-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T23:55:26Z","timestamp":1452815726000},"page":"126-133","source":"Crossref","is-referenced-by-count":6,"title":["A secure minimalist RFID authentication and an ownership transfer protocol compliant to EPC C1G2"],"prefix":"10.1109","author":[{"given":"Sviatoslav","family":"Edelev","sequence":"first","affiliation":[]},{"given":"Somayeh","family":"Taheri","sequence":"additional","affiliation":[]},{"given":"Dieter","family":"Hogrefe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"108","article-title":"Privacy-Preserving Authorized {RFID} Authentication Protocols","volume":"8651","author":"li","year":"2014","journal-title":"Radio Frequency Identification Security and Privacy Issues - 10th International Workshop RFIDSec 2014 Oxford UK July 21&#x2013;23 2014 Revised Selected Papers"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-010-0001-0"},{"journal-title":"Gen-2 Standard","article-title":"Class-l generation 2 UHF air interface protocol standard version 1.2.0, Gen 2, 2008","year":"2008","key":"ref10"},{"key":"ref11","first-page":"34","article-title":"Security of EPC Class-l","author":"picazo-sanchez","year":"2012","journal-title":"Secur Trends Wirel Identif Sens Platf Tags Adv RFID Adv RFID"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.01.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_9"},{"key":"ref16","first-page":"292","article-title":"Rabin public-key encryption","author":"menezes","year":"0","journal-title":"Handbook of Applied Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229319"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_29"},{"key":"ref28","first-page":"34","article-title":"The Chinese Remainder Theorem","author":"ireland","year":"1990","journal-title":"A Classical Introduction to Modern Number Theory"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_16"},{"key":"ref3","first-page":"49","article-title":"Adversarial Model for Radio Frequency Identification","volume":"2005","author":"avoine","year":"2005","journal-title":"IACR Cryptology ePrint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71641-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295430"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_39"},{"key":"ref1","first-page":"2330","article-title":"A brief survey on current RFID applications","volume":"4","author":"ng","year":"2009","journal-title":"2009 International Conference on Machine Learning and Cybernetics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIE.2009.24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.018"},{"key":"ref21","article-title":"Security flaws in a recent ultralightweight RFID protocol","author":"peris-lopez","year":"2009","journal-title":"arXiv Prepr arXiv0910 2115"},{"article-title":"Digitalized signatures and public-key functions as intractable as factorization","year":"1979","author":"rabin","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.06.015"},{"key":"ref26","article-title":"Implementing public-key cryptography on passive RFID tags is practical","author":"arbit","year":"2014","journal-title":"Int J Inf Secur"},{"journal-title":"Elementary Number Theory and Its Applications","year":"1993","author":"rosen","key":"ref25"}],"event":{"name":"2015 IEEE International Conference on RFID Technology and Applications (RFID-TA)","start":{"date-parts":[[2015,9,16]]},"location":"Tokyo, Japan","end":{"date-parts":[[2015,9,18]]}},"container-title":["2015 IEEE International Conference on RFID Technology and Applications (RFID-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7371322\/7379785\/07379806.pdf?arnumber=7379806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:44:32Z","timestamp":1490373872000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7379806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2015.7379806","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}