{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:14:23Z","timestamp":1763388863229},"reference-count":18,"publisher":"International Academy Publishing (IAP)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.8.11.2880-2887","type":"journal-article","created":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T02:42:31Z","timestamp":1383878551000},"source":"Crossref","is-referenced-by-count":16,"title":["A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography"],"prefix":"10.17706","volume":"8","author":[{"given":"Ya-li","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiao-lin","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo-han","family":"Li","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,11,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2043949"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2012.733209"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.3.605-612"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.9.2405-2412"},{"key":"ref6","first-page":"68","article-title":"On Privacy Models for RFID","volume-title":"Proc Adances in Cryptology (ASIA CRYPT 07) LNCS 4833","author":"Vaudenay","year":"2007","unstructured":"[7] S.Vaudenay, \"On Privacy Models for RFID,\" Proc. Adances in Cryptology (ASIA CRYPT'07), LNCS 4833, Springer-Verlag, Berlin, pp. 68-87, 2007."},{"key":"ref7","first-page":"401","article-title":"ECC is Ready for RFID\u2014a Proof in Silicon","volume-title":"SAC 2008 LNCS 5381","author":"Hein","year":"2009","unstructured":"[8] D. Hein, J. Wolkerstorfer, and N. Felber, \"ECC is Ready for RFID\u2014a Proof in Silicon,\" In: R. Avanzi, L. Keliher, F. Sica (Eds.): SAC 2008, LNCS 5381, pp. 401\u2013413, Springer-Verlag, 2009."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.148"},{"key":"ref9","first-page":"12","article-title":"LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags","volume-title":"Proc Second Workshop RFID Security","author":"Peris-Lopez","year":"2006","unstructured":"[10] P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, \"LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags,\" Proc. Second Workshop RFID Security, Graz, Austria, pp.12-14, July, 2006."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1278901.1278916"},{"key":"ref11","first-page":"13","article-title":"Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?","volume-title":"Proc Workshop on RFID and Lightweight Crypto","author":"Wolkerstorfer","year":"2005","unstructured":"[16] J. Wolkerstorfer, \"Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?\" Proc. Workshop on RFID and Lightweight Crypto, Graz, pp. 13-15, July, 2005."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol6.issue3.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4236\/am.2012.34051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-009-9226-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Use of Elliptic Curves in Cryptography","volume-title":"Proc Cryptology-CRYPTO 85 LNCS 218","author":"Miller","year":"1986","unstructured":"[24] V. S. Miller, \"Use of Elliptic Curves in Cryptography,\" Proc. Cryptology-CRYPTO'85, LNCS 218, Springer-Verlag, Berlin, pp: 417\u2013426, 1986."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.013"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:37:19Z","timestamp":1498095439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/11389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,1]]},"references-count":18,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2013,11,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.8.11.2880-2887","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,11,1]]}}}