{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:35Z","timestamp":1729619075274,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.17","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"102-109","source":"Crossref","is-referenced-by-count":5,"title":["A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption"],"prefix":"10.1109","author":[{"given":"Mohammad Saiful Islam","family":"Mamun","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Universally composable and forward-secure rfid authentication and authenticated key exchange","author":"le","year":"2007","journal-title":"ACM Symposium on Information Computer and Communications Security (ASIACCS)"},{"key":"17","article-title":"A new rfid privacy model","author":"hermans","year":"2011","journal-title":"ESORICS"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/LightSec.2011.15"},{"key":"33","first-page":"118","article-title":"A new framework for rfid privacy","author":"deng","year":"2010","journal-title":"Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 10) Vol 6345 of LNCS"},{"key":"15","first-page":"394","article-title":"On the reciprocal of the general algebraic matrix","volume":"26","author":"moore","year":"1920","journal-title":"Bulletin of the American Mathematical Society"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_29"},{"key":"16","first-page":"712","article-title":"An efficient pseudo inverse matrix-based solution for secure auditing","author":"thuc","year":"2010","journal-title":"RIVF IEEE"},{"key":"13","first-page":"361","article-title":"Hb++: Increasing the security and efficiency of hb+","author":"gilbert","year":"2008","journal-title":"EUROCRYPT 2008 Volume 4965 of LNCS"},{"key":"14","first-page":"108","article-title":"On the security of hb# against a man-in-the-middle attack","author":"ouafi","year":"2008","journal-title":"ASIACRYPT 2008 Volume 5350 of LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.011"},{"key":"12","first-page":"156","article-title":"Good variants of hb+ are hard to find","author":"gilbert","year":"2008","journal-title":"FC 2008 Volume 5143 of LNCS"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519342"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-13858-4_4","article-title":"Lightweight privacy preserving authentication for rfid using a stream cipher","author":"billet","year":"2010","journal-title":"Fast Software Encryption workshop (FSE"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5303448"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9039-0"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34601-9_36"},{"key":"26","article-title":"An efficient delegation and transfer of ownership protocol for rfid tags","author":"fouladgar","year":"2007","journal-title":"First International EURASIP Workshop on RFID Technology Vienna Austria"},{"key":"27","article-title":"Practical rfid ownership transfer scheme","author":"yu ng","year":"2010","journal-title":"Journal of Computer Security-Special Issue on RFID System Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_40"},{"key":"29","doi-asserted-by":"crossref","first-page":"306","DOI":"10.2307\/2298294","article-title":"Cryptography in an algebraic alphabet","volume":"36","author":"hill","year":"1929","journal-title":"The American Mathematical Monthly"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2008.20"},{"key":"2","first-page":"293","article-title":"Authenticating pervasive devices with human protocols","author":"juels","year":"2005","journal-title":"CRYPTO 2005 Volume 3621 of LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.52"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1080\/01611190008984253"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1137\/0702016"},{"key":"6","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","article-title":"Secure human identification protocols. Advances in cryptology-asiacrypt 2001","volume":"2248","author":"hopper","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2009.5202241"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.09.002"},{"journal-title":"Hill cipher and Modular Linear Algebra","year":"1998","author":"murray","key":"31"},{"key":"4","article-title":"An elliptic curve processor suitable for rfid tags","author":"batina","year":"2006","journal-title":"International Associationfor Cryptologic Research EPrint Archive"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052622"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9061-2"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680829.pdf?arnumber=6680829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:57Z","timestamp":1498091217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.17","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}