{"id":"https://openalex.org/W2120829580","doi":"https://doi.org/10.1109/iihmsp.2007.4457540","title":"Enhancement of the Mutual Authentication protocol on RFID Passive Tags","display_name":"Enhancement of the Mutual Authentication protocol on RFID Passive Tags","publication_year":2007,"publication_date":"2007-11-01","ids":{"openalex":"https://openalex.org/W2120829580","doi":"https://doi.org/10.1109/iihmsp.2007.4457540","mag":"2120829580"},"language":"en","primary_location":{"id":"doi:10.1109/iihmsp.2007.4457540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062368874","display_name":"Kuo\u2010Ching Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Kuo-Ching Liu","raw_affiliation_strings":["School of Medical Laboratory Science and Biotechnology, China Medical University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"School of Medical Laboratory Science and Biotechnology, China Medical University, Taichung, Taiwan","institution_ids":["https://openalex.org/I184693016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058319682","display_name":"Hsin-Wei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsin-Wei Wang","raw_affiliation_strings":["Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102165204","display_name":"Hui\u2010Feng Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hui-Feng Huang","raw_affiliation_strings":["Department of Information Management, National Taichung Institute of Technology, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taichung Institute of Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062368874"],"corresponding_institution_ids":["https://openalex.org/I184693016"],"apc_list":null,"apc_paid":null,"fwci":0.5792,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74754669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"261","last_page":"264"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.8738440275192261},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7610317468643188},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.652267575263977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6398725509643555},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5858517289161682},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.5570728778839111},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.548916220664978},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.548203706741333},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5345138311386108},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5024733543395996},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4636954069137573},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4415794014930725}],"concepts":[{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.8738440275192261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610317468643188},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.652267575263977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6398725509643555},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5858517289161682},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.5570728778839111},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.548916220664978},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.548203706741333},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5345138311386108},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5024733543395996},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4636954069137573},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4415794014930725},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iihmsp.2007.4457540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W77932805","https://openalex.org/W143688472","https://openalex.org/W1862712733","https://openalex.org/W2112137829","https://openalex.org/W2115893326","https://openalex.org/W2134011023","https://openalex.org/W2151783055","https://openalex.org/W6603139566","https://openalex.org/W6605849663","https://openalex.org/W6639080831","https://openalex.org/W6676712205"],"related_works":["https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050","https://openalex.org/W2399882206","https://openalex.org/W3201780008","https://openalex.org/W2043851470"],"abstract_inverted_index":{"Radio":[0],"frequency":[1],"identification":[2],"(RFID)":[3],"is":[4,108],"being":[5],"deployed":[6],"for":[7,97],"a":[8,41,64,89,94,112,118],"wide":[9],"variety":[10],"of":[11,51],"applications,":[12],"including":[13],"supply":[14],"chain":[15],"management,":[16],"inventory,":[17],"storage,":[18],"etc.":[19],"However,":[20,99],"RFID":[21,84],"systems":[22],"can":[23],"have":[24],"security":[25,81],"problems":[26],"if":[27],"the":[28,49,52,56,78],"tag":[29],"offers":[30,77],"no":[31],"access":[32],"control":[33],"and":[34,54,92],"certificated":[35],"mechanisms.":[36],"By":[37],"utilizing":[38],"responses":[39],"from":[40],"tag,":[42],"an":[43],"adversary":[44],"may":[45],"try":[46],"to":[47,87,111,121],"obtain":[48],"information":[50],"product":[53],"trace":[55],"user.":[57],"In":[58],"2006,":[59],"Lee":[60,104],"et":[61,105],"al.":[62],"proposed":[63],"mutual":[65,85],"authentication":[66,86],"scheme":[67,76,107],"based":[68],"on":[69],"synchronized":[70],"secret":[71],"information.":[72],"They":[73],"show":[74,102],"their":[75],"most":[79],"enhanced":[80],"feature":[82],"in":[83],"protect":[88],"user's":[90],"privacy":[91],"possesses":[93],"low":[95],"computation":[96],"tags.":[98],"we":[100],"will":[101],"that":[103],"al's":[106],"still":[109],"susceptible":[110],"forgery":[113],"attack.":[114],"We":[115],"also":[116],"present":[117],"simple":[119],"method":[120],"strengthen":[122],"its":[123],"security.":[124]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
