{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:28:52Z","timestamp":1742398132618},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767879"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76788-6_9","type":"book-chapter","created":{"date-parts":[[2007,11,12]],"date-time":"2007-11-12T14:24:16Z","timestamp":1194877456000},"page":"102-115","source":"Crossref","is-referenced-by-count":11,"title":["Passive Attacks on a Class of Authentication Protocols for RFID"],"prefix":"10.1007","author":[{"given":"Basel","family":"Alomair","sequence":"first","affiliation":[]},{"given":"Loukas","family":"Lazos","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol.\u00a04159, Springer, Heidelberg (2006)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags. In: OTM Federated Conferences and Workshop: IS Workshop. LNCS, Springer, Heidelberg (2006)","DOI":"10.1007\/11915034_59"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: IFIP SEC (2007)","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.H.: Vulnerability Analysis of EMAP - An Efficient RFID Mutual Authentication Protocol. In: AReS 2007: Second International Conference on Availability, Reliability and Security (2007)","DOI":"10.1109\/ARES.2007.159"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_4","volume-title":"ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, Springer, Heidelberg (2001)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, Springer, Heidelberg (2005)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB\u2009+\u2009 \u2013 A provably Secure Lightweight Authentication Protocol Protocol (2005)","DOI":"10.1049\/el:20052622"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, Springer, Heidelberg (2005)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, Springer, Heidelberg (2003)"},{"key":"9_CR10","unstructured":"Feldhofer, M., Aigner, M., Dominikus, S.: An Application of RFID Tags using Secure Symmetric Authentication. In: SecPerU 2005. International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (2005)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Avoine, G.: Privacy Issues in RFID Banknote Protection Schemes. In: International Conference on Smart Card Research and Advanced Applications \u2013 CARDIS (2004)","DOI":"10.1007\/1-4020-8147-2_3"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: SPC 2003. International Conference on Security in Pervasive Computing (2003)","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2004","author":"M. Ohkubo","year":"2004","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, Springer, Heidelberg (2004)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2003","author":"I. Vajda","year":"2003","unstructured":"Vajda, I., Butty\u00e1n, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, Springer, Heidelberg (2003)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Defend, B., Fu, K., Juels, A.: Cryptanalysis of Two Lightweight RFID Authentication Schemes. In: International Workshop on Pervasive Computing and Communication Security \u2013 PerSec (2007)","DOI":"10.1109\/PERCOMW.2007.34"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Juels, A.: RFID Security and Privacy: A research Survey (2005)","DOI":"10.1145\/1023646.1023652"},{"key":"9_CR17","unstructured":"Avoine, G.: Bibliography on Security and Privacy in RFID Systems http:\/\/lasecwww.epfl.ch\/gavoine\/rfid\/"},{"key":"9_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-9003-7","volume-title":"Introduction to cryptography","author":"J.A. Buchmann","year":"2004","unstructured":"Buchmann, J.A.: Introduction to cryptography. Springer, Heidelberg (2004)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An overview of Problems and Proposed Solutions. IEEE Security & Privacy (2005)","DOI":"10.1109\/MSP.2005.78"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76788-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:38:34Z","timestamp":1619519914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76788-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767879"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76788-6_9","relation":{},"subject":[]}}