{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T02:51:25Z","timestamp":1720925485977},"reference-count":26,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Technical Report"],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1016\/j.istr.2008.09.002","type":"journal-article","created":{"date-parts":[[2008,10,13]],"date-time":"2008-10-13T06:22:28Z","timestamp":1223878948000},"page":"151-157","source":"Crossref","is-referenced-by-count":28,"title":["New mutual agreement protocol to secure mobile RFID-enabled devices"],"prefix":"10.1016","volume":"13","author":[{"given":"N.W.","family":"Lo","sequence":"first","affiliation":[]},{"given":"Kuo-Hui","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.istr.2008.09.002_bib8","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/26.837039","article-title":"Extensions to an authentication technique proposed for the global mobility network","volume":"48","author":"Butty\u00e1n","year":"2000","journal-title":"IEEE Transaction on Communication"},{"issue":"2","key":"10.1016\/j.istr.2008.09.002_bib6","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","article-title":"Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards","volume":"29","author":"Chien","year":"2007","journal-title":"Computer Standards and Interfaces"},{"key":"10.1016\/j.istr.2008.09.002_bib9","doi-asserted-by":"crossref","unstructured":"Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy. In: Proceedings of the fifth annual IEEE international conference on pervasive computing and communications workshops (PerComW'07), New York, USA; March 2007. p. 229\u201334.","DOI":"10.1109\/PERCOMW.2007.100"},{"issue":"4","key":"10.1016\/j.istr.2008.09.002_bib21","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ELGamal","year":"1985","journal-title":"IEEE Transaction on Information Theory"},{"key":"10.1016\/j.istr.2008.09.002_bib20","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.csi.2007.01.004","article-title":"ID-based digital signature scheme on the elliptic curve cryptosystem","volume":"29","author":"Fang Chung","year":"2007","journal-title":"Computer Standards and Interfaces"},{"key":"10.1016\/j.istr.2008.09.002_bib5","series-title":"Workshop on pervasive computing and communications security (PerSec'04) at IEEE PerCom 2004","article-title":"Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers","author":"Henrici","year":"2004"},{"issue":"2","key":"10.1016\/j.istr.2008.09.002_bib7","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/TWC.2003.809452","article-title":"A self-encryption mechanism for authentication of roaming and teleconference services","volume":"2","author":"Hwang","year":"2003","journal-title":"IEEE Transaction on Wireless Communication"},{"issue":"1","key":"10.1016\/j.istr.2008.09.002_bib14","first-page":"31","article-title":"A wireless-based authentication and anonymous channels for GSM system","volume":"17","author":"Hwang","year":"2006","journal-title":"Journal of Computers"},{"key":"10.1016\/j.istr.2008.09.002_bib19","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1016\/S0140-3664(99)00108-5","article-title":"Anonymous channel and authentication in wireless communication","volume":"22","author":"Juang","year":"1999","journal-title":"Computer Communication"},{"key":"10.1016\/j.istr.2008.09.002_bib18","doi-asserted-by":"crossref","unstructured":"Tri Van Le, Mike Burmester, Breno de Medeiros, Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS'07, Singapore; March 20\u201322, 2007.","DOI":"10.1145\/1229285.1229319"},{"issue":"No. 2","key":"10.1016\/j.istr.2008.09.002_bib3","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1049\/ip-com:20030290","article-title":"Extension of authentication protocol for GSM","volume":"150","author":"Lee","year":"2003","journal-title":"IEE Proceedings of Communications"},{"key":"10.1016\/j.istr.2008.09.002_bib17","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s11277-005-6177-z","article-title":"Private authentication techniques for the global mobility network","volume":"35","author":"Lee","year":"2005","journal-title":"Wireless Personal Communication"},{"key":"10.1016\/j.istr.2008.09.002_bib13","series-title":"Second international workshop on trustworthiness, reliability and services in ubiquitous and sensor networks, TRUST'07","first-page":"43","article-title":"An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system","volume":"vol. 4809","author":"Lo","year":"2007"},{"key":"10.1016\/j.istr.2008.09.002_bib11","unstructured":"N.W. Lo, Kuo-Hui Yeh, Hash-based mutual authentication protocol for mobile RFID systems with robust reader-side privacy. In: First ACM workshop on convergence of RFID and wireless sensor networks and their applications, SenseID'07; November 2007."},{"key":"10.1016\/j.istr.2008.09.002_bib12","series-title":"Fourth VLDB workshop on secure data management, SDM'07","first-page":"203","article-title":"Novel RFID authentication schemes for security enhancement and system efficiency","volume":"vol. 4721","author":"Lo","year":"2007"},{"key":"10.1016\/j.istr.2008.09.002_bib1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/BF00203817","article-title":"Elliptic curve in cryptosystem and their implementation","author":"Menezes","year":"1993","journal-title":"Journal of Cryptology"},{"key":"10.1016\/j.istr.2008.09.002_bib2","series-title":"Advances in cryptology \u2013 proceedings of Crypto'85","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"vol. 218","author":"Miller","year":"1986"},{"key":"10.1016\/j.istr.2008.09.002_bib25","unstructured":"Mobile phone and RFID taxi tracking service, ."},{"key":"10.1016\/j.istr.2008.09.002_bib4","doi-asserted-by":"crossref","unstructured":"David Molnar, David Wagner. Privacy and security in library RFID: issues, practices, and architectures. In: Conference on computer and communications security \u2013 CCS'04; October 2004. p. 210\u20139.","DOI":"10.1145\/1030083.1030112"},{"key":"10.1016\/j.istr.2008.09.002_bib23","series-title":"Secure hash standard","author":"NIST FIPS PUB 180","year":"1993"},{"key":"10.1016\/j.istr.2008.09.002_bib10","series-title":"Cryptographic approach to \u2018Privacyfriendly\u2019 tags","author":"Ohkubo","year":"2003"},{"key":"10.1016\/j.istr.2008.09.002_bib22","series-title":"Advances in cryptograph \u2013 proceedings of crypto'92","first-page":"31","article-title":"Provably secure and practical identification schemes and corresponding signature schemes","volume":"vol. 740","author":"Okamoto","year":"1992"},{"key":"10.1016\/j.istr.2008.09.002_bib24","series-title":"The MD5 message-digest algorithm, RFC 1321","author":"Rivest","year":"1992"},{"issue":"8","key":"10.1016\/j.istr.2008.09.002_bib15","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/49.634798","article-title":"An authentication technique based on distributed security management for the global mobility network","volume":"15","author":"Suzuki","year":"1997","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/j.istr.2008.09.002_bib26","unstructured":"Thirsty Koreans fight duff whisky with mobiles, ."},{"key":"10.1016\/j.istr.2008.09.002_bib16","first-page":"201","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"Weis","year":"2003","journal-title":"Security in Pervasive Computing"}],"container-title":["Information Security Technical Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412708000423?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412708000423?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,9]],"date-time":"2020-05-09T03:38:03Z","timestamp":1588995483000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1363412708000423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["S1363412708000423"],"URL":"https:\/\/doi.org\/10.1016\/j.istr.2008.09.002","relation":{},"ISSN":["1363-4127"],"issn-type":[{"value":"1363-4127","type":"print"}],"subject":[],"published":{"date-parts":[[2008,8]]}}}