{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:41:00Z","timestamp":1773380460001,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229319","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"242-252","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Universally composable and forward-secure RFID authentication and authenticated key exchange"],"prefix":"10.1145","author":[{"given":"Tri","family":"Van Le","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]},{"given":"Mike","family":"Burmester","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]},{"given":"Breno","family":"de Medeiros","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102134"},{"key":"e_1_3_2_1_2_1","unstructured":"Avoine G. Security and privacy in RFID systems. http:\/\/lasecwww.epf1.ch\/~gavoine\/rfid\/.]]  Avoine G. Security and privacy in RFID systems. http:\/\/lasecwww.epf1.ch\/~gavoine\/rfid\/.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop Record","author":"Batina L.","year":"2004","unstructured":"Batina , L. , Lano , J. , Mentens , N. , \u00d6rs , S. B. , Preneel , B. , and Verbauwhede , I . Energy, performance, area versus security trade-offs for stream ciphers. In The State of the Art of Stream Ciphers , Workshop Record ( 2004 ), ECRYPT.]] Batina, L., Lano, J., Mentens, N., \u00d6rs, S. B., Preneel, B., and Verbauwhede, I. Energy, performance, area versus security trade-offs for stream ciphers. In The State of the Art of Stream Ciphers, Workshop Record (2004), ECRYPT.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-46766-1_31","volume-title":"Proc. Advances in Cryptology (CRYPTO 1991)","volume":"576","author":"Beaver D.","year":"1991","unstructured":"Beaver , D. Foundations of secure interactive computing . In Proc. Advances in Cryptology (CRYPTO 1991) ( 1991 ), vol. 576 of LNCS, Springer , pp. 377 -- 391 .]] Beaver, D. Foundations of secure interactive computing. In Proc. Advances in Cryptology (CRYPTO 1991) (1991), vol. 576 of LNCS, Springer, pp. 377--391.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705069"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proc. USENIX Security Symposium (USENIX Security 2005)","author":"Bono S. C.","year":"2005","unstructured":"Bono , S. C. , Green , M. , Stubblefield , A. , Rubin , A. J. A. D. , and Szydlo , M . Security analysis of a cryptographically-enabled RFID device . In Proc. USENIX Security Symposium (USENIX Security 2005) ( 2005 ), USENIX, pp. 1 -- 16 .]] Bono, S. C., Green, M., Stubblefield, A., Rubin, A. J. A. D., and Szydlo, M. Security analysis of a cryptographically-enabled RFID device. In Proc. USENIX Security Symposium (USENIX Security 2005) (2005), USENIX, pp. 1--16.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359563"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704151"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Proc. Advances in Crypotology (EUROCRYPT 2002)","volume":"2332","author":"Canetti R.","year":"2001","unstructured":"Canetti , R. , and Krawczyk , H . Universally composable notions of key exchange and secure channels (extended abstract) . In Proc. Advances in Crypotology (EUROCRYPT 2002) ( 2001 ), vol. 2332 of LNCS, Springer , p. 337 .]] Canetti, R., and Krawczyk, H. Universally composable notions of key exchange and secure channels (extended abstract). In Proc. Advances in Crypotology (EUROCRYPT 2002) (2001), vol. 2332 of LNCS, Springer, p. 337.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646758.705673"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"e_1_3_2_1_19_1","volume-title":"International Association for Cryptological Research","author":"Gilbert H.","year":"2005","unstructured":"Gilbert , H. , Rodshaw , M. , and Sibert , H . An active attack against HB+- a provably secure lightweight authentication protocol. Tech. rep ., International Association for Cryptological Research , 2005 .]] Gilbert, H., Rodshaw, M., and Sibert, H. An active attack against HB+- a provably secure lightweight authentication protocol. Tech. rep., International Association for Cryptological Research, 2005.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/519078"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978630"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_4"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Proc. Intern. Conf. on Security in Communication Networks (SCN 2004)","volume":"3352","author":"Juels A.","year":"2004","unstructured":"Juels , A. Minimalist cryptography for low-cost RFID tags . In Proc. Intern. Conf. on Security in Communication Networks (SCN 2004) ( 2004 ), vol. 3352 of LNCS, Springer , pp. 149 -- 164 .]] Juels, A. Minimalist cryptography for low-cost RFID tags. In Proc. Intern. Conf. on Security in Communication Networks (SCN 2004) (2004), vol. 3352 of LNCS, Springer, pp. 149--164.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"e_1_3_2_1_27_1","volume-title":"Defining strong privacy for RFID. E-print report 2006\/137","author":"Juels A.","year":"2006","unstructured":"Juels , A. , and Weis , S. A . Defining strong privacy for RFID. E-print report 2006\/137 , International Association for Cryptological Research , 2006 .]] Juels, A., and Weis, S. A. Defining strong privacy for RFID. E-print report 2006\/137, International Association for Cryptological Research, 2006.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102126"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128859"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19"},{"key":"e_1_3_2_1_32_1","unstructured":"Network of Excellence Within the Information Societies Technology (IST) Programme of the European Commission. Estream: The stream cipher project. http:\/\/www.ecrypt.eu.org\/stream.]]  Network of Excellence Within the Information Societies Technology (IST) Programme of the European Commission. Estream: The stream cipher project. http:\/\/www.ecrypt.eu.org\/stream.]]"},{"key":"e_1_3_2_1_33_1","volume-title":"RFID Privacy Workshop","author":"Ohkubo M.","year":"2003","unstructured":"Ohkubo , M. , Suzuki , K. , and Kinoshita , S . Cryptographic approach to \"privacy-friendly\" tags . RFID Privacy Workshop , November 2003 .]] Ohkubo, M., Suzuki, K., and Kinoshita, S. Cryptographic approach to \"privacy-friendly\" tags. RFID Privacy Workshop, November 2003.]]"},{"key":"e_1_3_2_1_34_1","volume-title":"CRYPTO 2006","author":"Oren Y.","year":"2006","unstructured":"Oren , Y. , and Shamir , A . Power analysis of RFID tags. Appeared in the rump session of Advances in Cryptology , CRYPTO 2006 . Available online at http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid\/, Weizmann Institute , 2006 .]] Oren, Y., and Shamir, A. Power analysis of RFID tags. Appeared in the rump session of Advances in Cryptology, CRYPTO 2006. Available online at http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid\/, Weizmann Institute, 2006.]]"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352639"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884436"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.45"}],"event":{"name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","location":"Singapore","acronym":"Asia CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229319","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:36Z","timestamp":1750258296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":35,"alternative-id":["10.1145\/1229285.1229319","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229319","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}