{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T20:34:08Z","timestamp":1723322048755},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2007,10,1]],"date-time":"2007-10-01T00:00:00Z","timestamp":1191196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/tdsc.2007.70226","type":"journal-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T22:05:14Z","timestamp":1194991514000},"page":"337-340","source":"Crossref","is-referenced-by-count":345,"title":["SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity"],"prefix":"10.1109","volume":"4","author":[{"family":"Hung-Yu Chien","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"bibq033721","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.011"},{"key":"bibq033722","article-title":"Cryptographic Approach to 'Privacy-Friendly' Tags","author":"ohkubo","year":"2003","journal-title":"Proc RFID Privacy Workshop"},{"key":"bibq033723","article-title":"LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags","author":"peris-lopez","year":"2006","journal-title":"Proc Second Workshop RFID Security"},{"key":"bibq033724","article-title":"EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags","author":"peris-lopez","year":"2006","journal-title":"Proc OTM Federated Conf and Workshop IS Workshop"},{"key":"bibq033720","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"bibq033719","article-title":"Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols","author":"li","year":"2007","journal-title":"Proc 22nd IFIP TC-11 Int'l Information Security Conf"},{"key":"bibq033718","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.159"},{"key":"bibq033715","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102229"},{"key":"bibq033714","first-page":"293","article-title":"Authenticating Pervasive Devices with Human Protocols","author":"juels","year":"2005","journal-title":"Proc 25th Ann Int'l Cryptology Conf (CRYPTO '05)"},{"key":"bibq033717","article-title":"Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?","author":"kumar","year":"2006","journal-title":"Proc Workshop RFID Security"},{"key":"bibq033716","article-title":"Privacy Enhanced Active RFID Tag","author":"kinoshita","year":"2005","journal-title":"Proc Int'l Workshop Exploiting Context Histories in Smart Environments"},{"key":"bibq033712","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080805"},{"key":"bibq03379","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052622"},{"key":"bibq033713","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"bibq033710","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"bibq033711","first-page":"52","article-title":"Secure Human Identification Protocols","author":"hopper","year":"2001","journal-title":"Proc Seventh Int'l Conf Theory and Application of Cryptology and Information Security"},{"key":"bibq03376","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/1278901.1278916","article-title":"Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements","author":"chien","year":"2007","journal-title":"ACM Operating System Rev"},{"key":"bibq03375","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.004"},{"key":"bibq03378","year":"2007"},{"key":"bibq03377","article-title":"Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning","author":"duc","year":"2006","journal-title":"Proc 2006 Symp Cryptography and Information Security"},{"key":"bibq03372","first-page":"1","article-title":"Security Analysis of a Cryptographically-Enabled RFID Device","author":"bono","year":"2005","journal-title":"Proc 14th USENIX Security Symp"},{"key":"bibq033731","article-title":"Security and Privacy on Authentication Protocol for Low-Cost Radio","author":"yang","year":"2005","journal-title":"Proc 2005 Symp Cryptography and Information Security"},{"key":"bibq03371","article-title":"Reducing Time Complexity in RFID Systems","author":"avoine","year":"2005","journal-title":"Proc 12th Ann Workshop Selected Areas in Cryptography (SAC)"},{"key":"bibq033730","article-title":"Mutual Authentication Protocol for Low-Cost RFID","author":"yang","year":"2005","journal-title":"Proc ECRYPT Workshop RFID and Lightweight Crypto"},{"key":"bibq03374","article-title":"Secure Access Control Schemes for RFID Systems with Anonymity","author":"chien","year":"2006","journal-title":"Proc 2006 Int'l Workshop Future Mobile and Ubiquitous Information Technologies (FMUIT '06)"},{"key":"bibq03373","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.10"},{"key":"bibq033727","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","article-title":"Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment","author":"rhee","year":"2005","journal-title":"Proc Int'l Conf Security in Pervasive Computing (SPC '05)"},{"key":"bibq033728","article-title":"Security and Privacy in Radio-Frequency Identification Devices","author":"weis","year":"2003"},{"key":"bibq033725","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1007\/11833529_93","article-title":"M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags","author":"peris-lopez","year":"2006","journal-title":"Proc Int'l Conf Ubiquitous Intelligence and Computing (UIC '06)"},{"key":"bibq033726","article-title":"HB and Related Lightweight Authentication Protocols for Secure RFID Tag\/Reader Authentication","author":"piramuthu","year":"2006","journal-title":"Proc CollECTeR Europe Conf"},{"key":"bibq033729","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems","author":"weis","year":"2004","journal-title":"Security in Pervasive Computing"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8858\/4378792\/04358711.pdf?arnumber=4358711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:42:51Z","timestamp":1638218571000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4358711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2007.70226","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2007,10]]}}}