{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:28:29Z","timestamp":1729643309135,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/sahcn.2009.5168980","type":"proceedings-article","created":{"date-parts":[[2009,7,22]],"date-time":"2009-07-22T10:23:35Z","timestamp":1248258215000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Towards Lightweight Secure Communication Protocols for Passive RFIDs"],"prefix":"10.1109","author":[{"given":"Dijiang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Harsh","family":"Kapoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"624","article-title":"cryptographic approach to privacy-friendly tags","author":"ohkubo","year":"2003","journal-title":"Proceedings of RFID Privacy Workshop"},{"key":"17","first-page":"4570","article-title":"rfid keeper: an rfid data access control mechanism","year":"2007","journal-title":"Proceedings of IEEE Global Telecommunications Conference"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"journal-title":"The Codebreakers The Comprehensive History of Secret Communication from Ancient Times to the Internet","year":"1996","author":"kahn","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.538"},{"key":"13","article-title":"squash: a new one-way hash function with provable security properties for highly constrained devices such as rfid tags","author":"shamir","year":"2007","journal-title":"Invited Talk International Conference on RFID Security (RFIDSec)"},{"key":"14","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","article-title":"squash-a new mac with provable security properties for highly constrained devices such as rfid tags","volume":"5086","year":"2008","journal-title":"Proceedings of the Workshop on Fast Sofware Encryption (FSE)"},{"key":"11","first-page":"283","article-title":"robust, anonymous rfid authentication with constant key-lookup","author":"burmester","year":"2008","journal-title":"Proceedings of ACM Symposium on Information Computer and Communications Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2008.021082"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"20","first-page":"619","article-title":"efficient authentication for low-cost rfid systems","author":"lee","year":"2005","journal-title":"Proceedings of International Conference on Computational Science and Its Applications (ICCSA)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.159"},{"key":"23","article-title":"security analysis of two ultra-lightweight rfid authentication protocols","author":"li","year":"2007","journal-title":"Proceedings of IFIP SEC"},{"key":"24","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/1229285.1229319","article-title":"universally composable and forward-secure rfid authentication and authenticated key exchange","author":"van le","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security"},{"key":"25","article-title":"authenticating pervasive devices with human protocols","author":"juels","year":"2005","journal-title":"Advances in Cryptology-Crypto 25th Annual International Cryptology Conference"},{"key":"26","first-page":"454","article-title":"rfid systems and security and privacy implications","author":"sarma","year":"2002","journal-title":"Proc Workshop Cryptographic Hardware and Embedded Systems (CHES '05)"},{"key":"27","article-title":"initial sram state as a fingerprint and source of true random numbers for rfid tags","author":"holcomb","year":"2007","journal-title":"Proceedings of the Conference on RFID Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213353"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.30"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45126-6_8","article-title":"squealing euros: privacy protection in rfidenabled banknotes","author":"juels","year":"2003","journal-title":"Proceedings of 7th International Conference on Financial Cryptography"},{"key":"10","first-page":"13","article-title":"a case against currently used hash functions in rfid protocols","author":"feldhofer","year":"2006","journal-title":"Proceedings of Workshop on RFID Security"},{"key":"1","article-title":"towards the five-cent tag","author":"sarma","year":"2001","journal-title":"Technical Report MITAUTOID- WH-006"},{"journal-title":"Designing Digital Computer Systems with Verilog","year":"2005","author":"lilja","key":"30"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/11935308_1","article-title":"strong and robust rfid authentication enabling perfect ownership transfer","author":"lim","year":"2006","journal-title":"Proceedings of Conference on Information and Communications Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378272"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"31","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"journal-title":"Class 1 Generation 2 UHF Air Interface Protocol Standard","year":"2004","key":"4"},{"key":"9","article-title":"security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"Proceedings of First International Conference on Security in Pervasive Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"}],"event":{"name":"2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks","start":{"date-parts":[[2009,6,22]]},"location":"Rome, Italy","end":{"date-parts":[[2009,6,26]]}},"container-title":["2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5168894\/5168895\/05168980.pdf?arnumber=5168980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T19:50:09Z","timestamp":1633722609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5168980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2009.5168980","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}