{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:37Z","timestamp":1750307737975,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653670","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"54-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["RFID privacy"],"prefix":"10.1145","author":[{"given":"Changshe","family":"Ma","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"volume-title":"ISO\/IEC-15408 Common Criteria for Information Technology Security Evaluation v2.1","year":"1999","key":"e_1_3_2_1_1_1","unstructured":"ISO\/IEC-15408 ( 1999 ). ISO\/IEC-15408 Common Criteria for Information Technology Security Evaluation v2.1 . http:\/\/csrc.nist.gov\/cc, 1999. ISO\/IEC-15408 (1999). ISO\/IEC-15408 Common Criteria for Information Technology Security Evaluation v2.1. http:\/\/csrc.nist.gov\/cc, 1999."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102134"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_20"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm","author":"Burmester Mike","year":"2006","unstructured":"Mike Burmester , Tri van Le , and Breno de Medeiros . Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols . In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm , pages 1 -- 9 , 2006 . Mike Burmester, Tri van Le, and Breno de Medeiros. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, pages 1--9, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791688.1791716"},{"volume-title":"Class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, version 1.0.9. EPC radio-frequency identity protocols","year":"2005","key":"e_1_3_2_1_8_1","unstructured":"EPCglobal. Class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, version 1.0.9. EPC radio-frequency identity protocols ( 2005 ), January 2005. www.epcglobalinc.org. EPCglobal. Class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, version 1.0.9. EPC radio-frequency identity protocols (2005), January 2005. www.epcglobalinc.org."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"The Foundations of Cryptography","author":"Goldreich O.","year":"2001","unstructured":"O. Goldreich . The Foundations of Cryptography , volume I , Basic Tools. Cambridge University Press , 2001 . O. Goldreich. The Foundations of Cryptography, volume I, Basic Tools. Cambridge University Press, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_18"},{"key":"e_1_3_2_1_13_1","first-page":"52","volume-title":"ASIACRYPT","author":"Nicholas","year":"2001","unstructured":"Nicholas J. Hopper and Manuel Blum. Secure human identification protocols . In ASIACRYPT , pages 52 -- 66 , 2001 . Nicholas J. Hopper and Manuel Blum. Secure human identification protocols. In ASIACRYPT, pages 52--66, 2001."},{"key":"e_1_3_2_1_14_1","volume-title":"Minimalist Cryptography for Low-Cost RFID Tags. In International Conference on Security in Communication Networks - SCN","author":"Juels A.","year":"2004","unstructured":"A. Juels . Minimalist Cryptography for Low-Cost RFID Tags. In International Conference on Security in Communication Networks - SCN 2004 . A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In International Conference on Security in Communication Networks - SCN 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_3_2_1_16_1","first-page":"75","volume-title":"17th USENIX Security Symposium","author":"Juels A.","year":"2008","unstructured":"A. Juels , R. Pappu , and B. Parno . Unidirectional key distribution across time and space with applications to RFID security . In 17th USENIX Security Symposium , pages 75 -- 90 , 2008 . A. Juels, R. Pappu, and B. Parno. Unidirectional key distribution across time and space with applications to RFID security. In 17th USENIX Security Symposium, pages 75--90, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102229"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_6"},{"key":"e_1_3_2_1_22_1","volume-title":"Conference on RFID Security","author":"Konidala D.","year":"2007","unstructured":"D. Konidala , Z. Kim , and K. Kim . A Simple and Cost-Effective RFID Tag-Reader Mutual Authentication Scheme . In Conference on RFID Security 2007 . D. Konidala, Z. Kim, and K. Kim. A Simple and Cost-Effective RFID Tag-Reader Mutual Authentication Scheme. In Conference on RFID Security 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_17"},{"key":"e_1_3_2_1_26_1","volume-title":"Symposium on Cryptography and Information Security","author":"Duc D. Nguyen","year":"2006","unstructured":"D. Nguyen Duc , J. Park , H. Lee , and K. Kim . Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning . In Symposium on Cryptography and Information Security 2006 . D. Nguyen Duc, J. Park, H. Lee, and K. Kim. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. In Symposium on Cryptography and Information Security 2006."},{"key":"e_1_3_2_1_27_1","volume-title":"Efficient Hash-Chain Based RFID Privacy Protection Scheme. In International Conference on Ubiquitous Computing - Ubicomp","author":"Ohkubo M.","year":"2004","unstructured":"M. Ohkubo , K. Suzuki , and S. Kinoshita . Efficient Hash-Chain Based RFID Privacy Protection Scheme. In International Conference on Ubiquitous Computing - Ubicomp , Workshop Privacy: Current Status and Future Directions , 2004 . M. Ohkubo, K. Suzuki, and S. Kinoshita. Efficient Hash-Chain Based RFID Privacy Protection Scheme. In International Conference on Ubiquitous Computing - Ubicomp, Workshop Privacy: Current Status and Future Directions, 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11872153_14"},{"key":"e_1_3_2_1_29_1","volume-title":"Workshop on RFID Security","author":"Pedro P. L.","year":"2008","unstructured":"P. L. Pedro , T. Li , T. Lim , H. C. J. Cesar , and M. E. T. Juan . Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard . In Workshop on RFID Security , 2008 . P. L. Pedro, T. Li, T. Lim, H. C. J. Cesar, and M. E. T. Juan. Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard. In Workshop on RFID Security, 2008."},{"key":"e_1_3_2_1_30_1","volume-title":"SRI International","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report , SRI International , 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998."},{"key":"e_1_3_2_1_31_1","volume-title":"Towards the 5 cents Tag. White Paper","author":"Sarma S.","year":"2001","unstructured":"S. Sarma . Towards the 5 cents Tag. White Paper , Auto-ID Center , 2001 . http:\/\/www.autoidlabs.org\/whitepapers\/mit-autoid-wh-006.pdf. S. Sarma. Towards the 5 cents Tag. White Paper, Auto-ID Center, 2001. http:\/\/www.autoidlabs.org\/whitepapers\/mit-autoid-wh-006.pdf."},{"issue":"1","key":"e_1_3_2_1_32_1","first-page":"2","article-title":"Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes","volume":"6","author":"Sarma S.","year":"2003","unstructured":"S. Sarma , S. Weis , and D. Engels . Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes , RSA Laboratories , 6 ( 1 ): 2 -- 9 , 2003 . S. Sarma, S. Weis, and D. Engels. Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes, RSA Laboratories, 6(1):2--9, 2003.","journal-title":"RSA Laboratories"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.31"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"e_1_3_2_1_36_1","volume-title":"Advances in Cryptology - Asiacrypt","author":"Vaudenay S.","year":"2007","unstructured":"S. Vaudenay . On Privacy Models for RFID . In Advances in Cryptology - Asiacrypt 2007 . S. Vaudenay. On Privacy Models for RFID. In Advances in Cryptology - Asiacrypt 2007."},{"key":"e_1_3_2_1_37_1","volume-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In International Conference on Security in Pervasive Computing - SPC","author":"Weis S.","year":"2003","unstructured":"S. Weis , S. Sarma , R. Rivest , and D. Engels . Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In International Conference on Security in Pervasive Computing - SPC 2003 . S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In International Conference on Security in Pervasive Computing - SPC 2003."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:52Z","timestamp":1750253932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653670"}},"subtitle":["relation between two notions, minimal condition, and efficient construction"],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":35,"alternative-id":["10.1145\/1653662.1653670","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653670","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}