{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236509,"version":"3.37.0"},"reference-count":31,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.10.6.369-375","type":"journal-article","created":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T13:42:17Z","timestamp":1435585337000},"source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags"],"prefix":"10.4304","volume":"10","author":[{"given":"Zhicai","family":"Shi","sequence":"first","affiliation":[]},{"given":"Fei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yongxiang","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yihan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Changzhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2015,6,29]]},"reference":[{"key":"ref1","first-page":"1","article-title":"RFID technology: a review of its applications","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","volume":"II","author":"Arun Nambiar","year":"2009","unstructured":"[1] N. Arun Nambiar, \"RFID technology: a review of its applications,\" in Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, vol. II, pp. 1-7, 2009."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"issue":"no. 1","key":"ref3","first-page":"2","article-title":"Radio-frequency identification: secure risks and challenges","volume":"6","author":"Sarma","year":"2003","unstructured":"[3] S. E. Sarma, S. A. Weis, D. W. Engels, \"Radio-frequency identification: secure risks and challenges,\" RSA Laboratories Cryptobytes, vol. 6, no. 1, pp. 2-9, 2003.","journal-title":"RSA Laboratories Cryptobytes"},{"key":"ref4","first-page":"201","article-title":"\"Security and privacy aspects of low-cost radio frequency identification systems,\" Security in Pervasive Computing 2003","volume":"2802","author":"Weis","year":"2004","unstructured":"[4] S. A. Weis, S. E. Sarma, R. L. Rivest, D. W. Engels, \"Security and privacy aspects of low-cost radio frequency identification systems,\" Security in Pervasive Computing 2003, LNCS, vol. 2802, pp. 201\u2013212, 2004.","journal-title":"LNCS"},{"key":"ref5","article-title":"Cryptographic approach to \"privacy-friendly\" tags","volume-title":"RFID Privacy Workshop","author":"Ohkubo","year":"2003","unstructured":"[5] M. Ohkubo, K. Suzuki, and S. Kinoshita, \"Cryptographic approach to \"privacy-friendly\" tags,\" RFID Privacy Workshop, MIT Press, Cambridge, 2003."},{"key":"ref6","first-page":"719","article-title":"Hash-chain based forward secure privacy protection scheme for low-cost RFID","volume-title":"Proceedings of the 2004 Symposium on Cryptography and Formation Security","author":"Ohkubo","year":"2004","unstructured":"[6] M. Ohkubo, K. Suzuki, and S. Kinoshita, \"Hash-chain based forward secure privacy protection scheme for low-cost RFID,\" in Proceedings of the 2004 Symposium on Cryptography and Formation Security, Sendai, Japan, pp. 719-724, 2004."},{"key":"ref7","first-page":"1","article-title":"Secure and low-cost RFID authentication protocols","volume-title":"Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks","author":"Lee","year":"2005","unstructured":"[8] Yong Ki Lee, Ingrid Verbauwhede, \"Secure and low-cost RFID authentication protocols,\" in Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, pp. 1-5, 2005."},{"key":"ref8","first-page":"619","article-title":"Efficient authentication for low-cost RFID systems","volume":"3480","author":"Su","year":"2005","unstructured":"[9] Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim, \"Efficient authentication for low-cost RFID systems,\" LNCS, vol. 3480, pp. 619-627, 2005.","journal-title":"LNCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.029"},{"key":"ref10","first-page":"1","article-title":"Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol","volume":"3","author":"Cho","year":"2012","unstructured":"[11] Jung-Sik Cho, Young-Sik Jeong, and Oh-Park Sang, \"Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol,\" Computers and Mathematics with Applications, 3, pp. 1-8, 2012.","journal-title":"Comput Math Appl","ISSN":"https:\/\/id.crossref.org\/issn\/0898-1221","issn-type":"print"},{"issue":"no. 4","key":"ref11","first-page":"357","article-title":"Desynchronization attack on hash-based RFID mutual authentication protocol","volume":"9","author":"Kim","year":"2012","unstructured":"[12] Hyunsung Kim, \"Desynchronization attack on hash-based RFID mutual authentication protocol,\" Journal of Security Engineering, vol. 9, no. 4, pp. 357-365, 2012.","journal-title":"Journal of Security Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2013.09.073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6414992"},{"issue":"no. 3","key":"ref15","first-page":"183","volume":"7","author":"Yang","year":"2013","unstructured":"[16] Liu Yang, Peng Yu, Wang Bailing, Qu Yun, Bai Xuefeng, Yuan Xinling and Yin zelong, \"Hash-based RFID mutual authentication protocol,\" International Journal of Security and Its Applications, vol. 7, no. 3, pp. 183-194, 2013.","journal-title":"International Journal of Security and Its Applications"},{"key":"ref16","first-page":"52","article-title":"Security human identification protocols","volume":"2248","author":"Hopper","year":"2001","unstructured":"[17] N. J. Hopper and M. Blum, \"Security human identification protocols,\" Advances in Cryptology-ASIACRYPY, LNCS, vol. 2248, pp. 52-66, 2001.","journal-title":"Advances in Cryptology-ASIACRYPY LNCS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2013.V1.13"},{"key":"ref18","first-page":"293","article-title":"\"Authenticating pervasive devices with human protocols,\" Advances in Cryptology-Crypto2005","volume":"3621","author":"Juels","year":"2005","unstructured":"[19] A. Juels and S. Weis, \"Authenticating pervasive devices with human protocols,\" Advances in Cryptology-Crypto2005, LNCS, vol. 3621, pp. 293-308, 2005.","journal-title":"LNCS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052622"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_12"},{"key":"ref21","article-title":"HB++: a lightweight authentication protocol secure against some attack","author":"Julien","year":"2006","unstructured":"[22] Julien BRINGER, Herv\u2019e CHABANNE and Emmanuelle DOTTAX, \"HB++: a lightweight authentication protocol secure against some attack,\" in Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU'06), pp. 28-33, 2006."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.011"},{"key":"ref23","first-page":"118","article-title":"HB-MP+ protocol: an improvement on the HB-MP protocol","volume-title":"Proceedings of IEEE International Conference on RFID","author":"Leng","year":"2008","unstructured":"[24] Xuefei Leng, Keith Mayes, Konstantinos Markantonakis, \"HB-MP+ protocol: an improvement on the HB-MP protocol,\" in Proceedings of IEEE International Conference on RFID, pp. 118-124, 2008."},{"key":"ref24","first-page":"361","article-title":"HB#: increasing the security and efficiency of HB+","volume":"4965","author":"Gilbert","year":"2008","unstructured":"[25] Henri Gilbert, Matthew J. B. Robshaw, and Yannick Seurin. \"HB#: increasing the security and efficiency of HB+,\" LNCS, vol. 4965, pp. 361\u2013378, 2008.","journal-title":"LNCS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_21"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928290"},{"key":"ref28","article-title":"Un-trusted-hb: security vulnerabilities of Trusted-hb","volume-title":"Workshop on RFID Security (RFIDSec)","author":"Frumkin","year":"2009","unstructured":"[29] D. Frumkin and A. Shamir. \"Un-trusted-hb: security vulnerabilities of Trusted-hb,\" In Workshop on RFID Security (RFIDSec), Leuven, Belgium, 2009."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74377-4_82"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74377-4_62"},{"issue":"no. 4","key":"ref31","first-page":"853","article-title":"A new security and privacy on RFID mutual authentication protocol based on partial ID","volume":"31","author":"Hui","year":"2009","unstructured":"[32] Zhang Hui, Hou Chao-huan, Wang Dong-hui, \"A new security and privacy on RFID mutual authentication protocol based on partial ID,\" Chinese Journal of Electronics & Information Technology, vol. 31, no. 4, pp. 853-856, 2009","journal-title":"Chinese Journal of Electronics & Information Technology"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:09:19Z","timestamp":1738775359000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,29]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2015,6,29]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.10.6.369-375","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2015,6,29]]}}}