{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:55Z","timestamp":1750307215820,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2185448.2185458","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A privacy-restoring mechanism for offline RFID systems"],"prefix":"10.1145","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Iwen","family":"Coisel","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Tania","family":"Martin","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. In Workshop on RFID Security -- RFIDSec'10","volume":"6370","author":"Avoine G.","year":"2010","unstructured":"G. Avoine , I. Coisel , and T. Martin . Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. In Workshop on RFID Security -- RFIDSec'10 , volume 6370 of Lecture Notes in Computer Science, pages 138--157. Springer , 2010 . G. Avoine, I. Coisel, and T. Martin. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. In Workshop on RFID Security -- RFIDSec'10, volume 6370 of Lecture Notes in Computer Science, pages 138--157. Springer, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_14"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"130","volume-title":"Advances in Cryptology CRYPTO'98","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , A. Desai , D. Pointcheval , and P. Rogaway . Relations Among Notions of Security for Public-Key Encryption Schemes . In Advances in Cryptology CRYPTO'98 , volume 1462 of Lecture Notes in Computer Science , pages 130 -- 141 . Springer , 1998 . M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology CRYPTO'98, volume 1462 of Lecture Notes in Computer Science, pages 130--141. Springer, 1998."},{"key":"e_1_3_2_1_7_1","unstructured":"A. Cavoukian. Privacy-by-Design. http:\/\/privacybydesign.ca\/.  A. Cavoukian. Privacy-by-Design. http:\/\/privacybydesign.ca\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0025-5564(02)00122-0"},{"key":"e_1_3_2_1_11_1","unstructured":"EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: Gen 2. http:\/\/www.epcglobalinc.org\/standards\/ 2008.  EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: Gen 2. http:\/\/www.epcglobalinc.org\/standards\/ 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1984.715946"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11422778_95"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_3_2_1_16_1","unstructured":"Infineon. Contactless SLE 66 Family. http:\/\/www.infineon.com\/.  Infineon. Contactless SLE 66 Family. http:\/\/www.infineon.com\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Information technology -- Security techniques -- Entity authentication","author":"International Organization for Standardization. ISO\/IEC 9798","year":"1991","unstructured":"International Organization for Standardization. ISO\/IEC 9798 : Information technology -- Security techniques -- Entity authentication , 1991 --2010. International Organization for Standardization. ISO\/IEC 9798: Information technology -- Security techniques -- Entity authentication, 1991--2010."},{"key":"e_1_3_2_1_18_1","volume-title":"Identification cards -- Contactless integrated circuit(s) cards -- Vicinity cards","author":"International Organization for Standardization. ISO\/IEC 15693","year":"2000","unstructured":"International Organization for Standardization. ISO\/IEC 15693 : Identification cards -- Contactless integrated circuit(s) cards -- Vicinity cards , 2000 --2009. International Organization for Standardization. ISO\/IEC 15693: Identification cards -- Contactless integrated circuit(s) cards -- Vicinity cards, 2000--2009."},{"key":"e_1_3_2_1_19_1","volume-title":"Identification cards -- Contactless integrated circuit cards -- Proximity cards","author":"International Organization for Standardization. ISO\/IEC 14443","year":"2001","unstructured":"International Organization for Standardization. ISO\/IEC 14443 : Identification cards -- Contactless integrated circuit cards -- Proximity cards , 2001 -2008. International Organization for Standardization. ISO\/IEC 14443: Identification cards -- Contactless integrated circuit cards -- Proximity cards, 2001-2008."},{"key":"e_1_3_2_1_20_1","volume-title":"Information technology -- Security techniques -- Evaluation criteria for IT security","author":"International Organization for Standardization. ISO\/IEC 15408 (Common Criteria)","year":"2008","unstructured":"International Organization for Standardization. ISO\/IEC 15408 (Common Criteria) : Information technology -- Security techniques -- Evaluation criteria for IT security , 2008 -2009. International Organization for Standardization. ISO\/IEC 15408 (Common Criteria): Information technology -- Security techniques -- Evaluation criteria for IT security, 2008-2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"e_1_3_2_1_24_1","first-page":"343","volume-title":"Directed-Graph Epidemiological Models of Computer Viruses. In IEEE Symposium on Security and Privacy S&P '91","author":"Kephart J. O.","year":"1991","unstructured":"J. O. Kephart and S. R. White . Directed-Graph Epidemiological Models of Computer Viruses. In IEEE Symposium on Security and Privacy S&P '91 , pages 343 -- 359 . IEEE, 1991 . J. O. Kephart and S. R. White. Directed-Graph Epidemiological Models of Computer Viruses. In IEEE Symposium on Security and Privacy S&P '91, pages 343--359. IEEE, 1991."},{"key":"e_1_3_2_1_25_1","volume-title":"Probabilistic Routing in Intermittently Connected Networks. In First International Workshop on Service Assurance with Partial and Intermittent Resources -- SAPIR'04","volume":"3126","author":"Lindgren A.","year":"2004","unstructured":"A. Lindgren , A. Doria , and O. Schelen . Probabilistic Routing in Intermittently Connected Networks. In First International Workshop on Service Assurance with Partial and Intermittent Resources -- SAPIR'04 , volume 3126 of Lecture Notes in Computer Science, pages 239--254. Springer , 2004 . A. Lindgren, A. Doria, and O. Schelen. Probabilistic Routing in Intermittently Connected Networks. In First International Workshop on Service Assurance with Partial and Intermittent Resources -- SAPIR'04, volume 3126 of Lecture Notes in Computer Science, pages 239--254. Springer, 2004."},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/www.avoine.net\/rfid\/","author":"Lounge R.","year":"2011","unstructured":"R. Lounge . http:\/\/www.avoine.net\/rfid\/ , 2011 . R. Lounge. http:\/\/www.avoine.net\/rfid\/, 2011."},{"key":"e_1_3_2_1_27_1","first-page":"137","volume":"326","author":"May R. M.","year":"1987","unstructured":"R. M. May and R. M. Anderson . Transmission Dynamics of HIV Infection. Nature , 326 : 137 -- 142 , 1987 . R. M. May and R. M. Anderson. Transmission Dynamics of HIV Infection. Nature, 326:137--142, 1987.","journal-title":"Transmission Dynamics of HIV Infection. Nature"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1035715.1035720"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"issue":"1","key":"e_1_3_2_1_31_1","article-title":"Spread of Epidemic Disease on Networks","volume":"66","author":"Newman M. E. J.","year":"2002","unstructured":"M. E. J. Newman . Spread of Epidemic Disease on Networks . Physical Review , 66 ( 1 ), 2002 . M. E. J. Newman. Spread of Epidemic Disease on Networks. Physical Review, 66(1), 2002.","journal-title":"Physical Review"},{"key":"e_1_3_2_1_32_1","first-page":"49","volume-title":"Virus Spread in Complete Bi-partite Graphs. In 2nd International ICST Conference on Bio-Inspired Models of Network, Information and Computing Systems -- Bionetics'07","author":"Omic J.","year":"2007","unstructured":"J. Omic , R. Kooij , and P. Van Mieghem . Virus Spread in Complete Bi-partite Graphs. In 2nd International ICST Conference on Bio-Inspired Models of Network, Information and Computing Systems -- Bionetics'07 , pages 49 -- 56 . ICST, 2007 . J. Omic, R. Kooij, and P. Van Mieghem. Virus Spread in Complete Bi-partite Graphs. In 2nd International ICST Conference on Bio-Inspired Models of Network, Information and Computing Systems -- Bionetics'07, pages 49--56. ICST, 2007."},{"key":"e_1_3_2_1_33_1","unstructured":"Privacy Rights Clearinghouse. Empowering Consumers Protecting Privacy. https:\/\/www.privacyrights.org\/.  Privacy Rights Clearinghouse. Empowering Consumers Protecting Privacy. https:\/\/www.privacyrights.org\/."},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","first-page":"433","volume-title":"Advances in Cryptology--CRYPTO'91","author":"Rackoff C.","year":"1991","unstructured":"C. Rackoff and D. R. Simon . Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack . In Advances in Cryptology--CRYPTO'91 , volume 576 of Lecture Notes in Computer Science , pages 433 -- 444 . Springer , 1991 . C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Advances in Cryptology--CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 433--444. Springer, 1991."},{"key":"e_1_3_2_1_35_1","volume-title":"May","author":"Reding V.","year":"2009","unstructured":"V. Reding . Commission Recommendation of 12.5.2009 - SEC(2009) 585\/586, on the Implementation of Privacy and Data Protection Principles in Applications Supported by Radio-Frequency Identification , May 2009 . V. Reding. Commission Recommendation of 12.5.2009 - SEC(2009) 585\/586, on the Implementation of Privacy and Data Protection Principles in Applications Supported by Radio-Frequency Identification, May 2009."},{"key":"e_1_3_2_1_36_1","unstructured":"RFIDea. Engineering & Applications in Electronic Traceability. http:\/\/www.rfidea.com\/.  RFIDea. Engineering & Applications in Electronic Traceability. http:\/\/www.rfidea.com\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.32"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mbs.2006.09.024"},{"key":"e_1_3_2_1_40_1","unstructured":"N. Semiconductors. JCOP Family. http:\/\/www.nxp.com\/.  N. Semiconductors. JCOP Family. http:\/\/www.nxp.com\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24663-3_2"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778443"},{"key":"e_1_3_2_1_44_1","first-page":"235","volume-title":"Single-Copy Routing in Intermittently Connected Mobile Networks. In First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks -- SECON'04","author":"Spyropoulos T.","year":"2004","unstructured":"T. Spyropoulos , K. Psounis , and C. S. Raghavendra . Single-Copy Routing in Intermittently Connected Mobile Networks. In First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks -- SECON'04 , pages 235 -- 244 . IEEE, 2004 . T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Single-Copy Routing in Intermittently Connected Mobile Networks. In First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks -- SECON'04, pages 235--244. IEEE, 2004."},{"key":"e_1_3_2_1_45_1","volume-title":"Epidemic Routing for Partially-Connected Ad Hoc Networks. Technical report","author":"Vahdat A.","year":"2000","unstructured":"A. Vahdat and D. Becker . Epidemic Routing for Partially-Connected Ad Hoc Networks. Technical report , Duke University , 2000 . A. Vahdat and D. Becker. Epidemic Routing for Partially-Connected Ad Hoc Networks. Technical report, Duke University, 2000."},{"key":"e_1_3_2_1_46_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology -- Asiacrypt","author":"Vaudenay S.","year":"2007","unstructured":"S. Vaudenay . On Privacy Models for RFID. In Advances in Cryptology -- Asiacrypt 2007 , volume 4833 of Lecture Notes in Computer Science , pages 68 -- 87 . Springer , 2007. S. Vaudenay. On Privacy Models for RFID. In Advances in Cryptology -- Asiacrypt 2007, volume 4833 of Lecture Notes in Computer Science, pages 68--87. Springer, 2007."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.323440"}],"event":{"name":"WISEC'12: Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Tucson Arizona USA","acronym":"WISEC'12"},"container-title":["Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2185448.2185458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:46Z","timestamp":1750241206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":41,"alternative-id":["10.1145\/2185448.2185458","10.1145\/2185448"],"URL":"https:\/\/doi.org\/10.1145\/2185448.2185458","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}