{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:30:23Z","timestamp":1775421023436,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102219.1102229","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"63-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["RFID security without extensive cryptography"],"prefix":"10.1145","author":[{"given":"Sindhu","family":"Karthikeyan","sequence":"first","affiliation":[{"name":"Kent State University, Kent, OH"}]},{"given":"Mikhail","family":"Nesterenko","sequence":"additional","affiliation":[{"name":"Kent State University, Kent, OH"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Workshop on Cryptographic Hardware and Embedded Systems CHES","author":"Feldhofer Martin","year":"2004","unstructured":"Martin Feldhofer , Sandra Dominikus , and Johannes Wolkerstorfer . Strong authentication for RFID systems using the AES algorithm . In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems CHES 2004 , volume 3156 of Lecture Notes in Computer Science , pages 357 -- 370 , Boston, Massachusetts, USA , August 2004. IACR, Springer-Verlag . Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 357--370, Boston, Massachusetts, USA, August 2004. IACR, Springer-Verlag."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification","author":"Finkenzeller Klaus","year":"2003","unstructured":"Klaus Finkenzeller . RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification . John Wiley & Sons , 2 nd edition, MAY 2003 . Includes bibliographical references and index. Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2nd edition, MAY 2003. Includes bibliographical references and index.","edition":"2"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","volume-title":"The Cryptographers' Track at the RSA Conference - CT-RSA","author":"Golle Philippe","year":"2004","unstructured":"Philippe Golle , Markus Jakobsson , Ari Juels , and Paul Syverson . Universal re-encryption for mixnets . In Tatsuaki Okamoto, editor, The Cryptographers' Track at the RSA Conference - CT-RSA , volume 2964 of Lecture Notes in Computer Science , San Francisco, California, USA , February 2004 . Springer-Verlag . Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Universal re-encryption for mixnets. In Tatsuaki Okamoto, editor, The Cryptographers' Track at the RSA Conference - CT-RSA, volume 2964 of Lecture Notes in Computer Science, San Francisco, California, USA, February 2004. Springer-Verlag."},{"key":"e_1_3_2_1_4_1","first-page":"149153","volume-title":"Workshop on Pervasive Computing and Communications Security PerSec 2004","author":"Henrici Dirk","year":"2004","unstructured":"Dirk Henrici and Paul M\u00fcller . Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Ravi Sandhu and Roshan Thomas, editors , Workshop on Pervasive Computing and Communications Security PerSec 2004 , pages 149153 , Orlando, Florida, USA , March 2004 . IEEE, IEEE Computer Society. Dirk Henrici and Paul M\u00fcller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Ravi Sandhu and Roshan Thomas, editors, Workshop on Pervasive Computing and Communications Security PerSec 2004, pages 149153, Orlando, Florida, USA, March 2004. IEEE, IEEE Computer Society."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029181"},{"key":"e_1_3_2_1_7_1","volume-title":"FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag","author":"Juels Ari","year":"2003","unstructured":"Ari Juels and Ravikanth Pappu . Squealing euros : Privacy protection in RFID-enabled banknotes . In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag , 2003 . Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"e_1_3_2_1_10_1","volume-title":"Cryptography and network security: principles and practice","author":"Stallings William","year":"1999","unstructured":"William Stallings . Cryptography and network security: principles and practice . Prentice-Hall , Englewood Cliffs, NJ 07632, USA, second edition, 1999 . William Stallings. Cryptography and network security: principles and practice. Prentice-Hall, Englewood Cliffs, NJ 07632, USA, second edition, 1999."},{"key":"e_1_3_2_1_11_1","volume-title":"August 06","author":"Vajda Istv An","year":"2003","unstructured":"Istv An Vajda and Levente Butty An . Lightweight authentication protocols for low-cost RFID tags , August 06 2003 . Istv An Vajda and Levente Butty An. Lightweight authentication protocols for low-cost RFID tags, August 06 2003."},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","volume-title":"Dieter Hutter, G. unter M\u00fcller","author":"Weis Stephen","year":"2003","unstructured":"Stephen Weis , Sanjay Sarma , Ronald Rivest , and Daniel Engels . Security and privacy aspects of low-cost radio frequency identification systems . In Dieter Hutter, G. unter M\u00fcller , Werner Stephan, and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003 , volume 2802 of Lecture Notes in Computer Science , Boppard, Germany, March 2003. Springer-Verlag . Stephen Weis, Sanjay Sarma, Ronald Rivest, and Daniel Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Dieter Hutter, G. unter M\u00fcller, Werner Stephan, and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, Boppard, Germany, March 2003. Springer-Verlag."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Alexandria VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102229","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102219.1102229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":12,"alternative-id":["10.1145\/1102219.1102229","10.1145\/1102219"],"URL":"https:\/\/doi.org\/10.1145\/1102219.1102229","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}