{"id":"https://openalex.org/W2071984515","doi":"https://doi.org/10.1109/rfid-ta.2012.6404532","title":"On the traceability of tags in SUAP RFID authentication protocols","display_name":"On the traceability of tags in SUAP RFID authentication protocols","publication_year":2012,"publication_date":"2012-11-01","ids":{"openalex":"https://openalex.org/W2071984515","doi":"https://doi.org/10.1109/rfid-ta.2012.6404532","mag":"2071984515"},"language":"en","primary_location":{"id":"doi:10.1109/rfid-ta.2012.6404532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rfid-ta.2012.6404532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036703361","display_name":"Masoumeh Safkhani","orcid":"https://orcid.org/0000-0002-1897-0828"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Masoumeh Safkhani","raw_affiliation_strings":["Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran","[Department of Electrical Engineering Iran University of Science and Technology, Tehran, Iran]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]},{"raw_affiliation_string":"[Department of Electrical Engineering Iran University of Science and Technology, Tehran, Iran]","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069794920","display_name":"Nasour Bagheri","orcid":"https://orcid.org/0000-0002-6818-5342"},"institutions":[{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"education","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Nasour Bagheri","raw_affiliation_strings":["Department of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran","institution_ids":["https://openalex.org/I83123760"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004222325","display_name":"Pedro Peris\u2010Lopez","orcid":"https://orcid.org/0000-0001-6943-0760"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pedro Peris-Lopez","raw_affiliation_strings":["Computer Security Lab (COSEC), Carlos III University of Madrid, Spain","Computer Security Lab (COSEC), Carlos III University of Madrid, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Security Lab (COSEC), Carlos III University of Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]},{"raw_affiliation_string":"Computer Security Lab (COSEC), Carlos III University of Madrid, Spain#TAB#","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035190728","display_name":"Aikaterini Mitrokotsa","orcid":"https://orcid.org/0000-0002-7073-0258"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Aikaterini Mitrokotsa","raw_affiliation_strings":["EPFL, Lausanne, Switzerland","EPFL. Lausanne,Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"EPFL. Lausanne,Switzerland","institution_ids":["https://openalex.org/I5124864"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036703361"],"corresponding_institution_ids":["https://openalex.org/I67009956"],"apc_list":null,"apc_paid":null,"fwci":2.0403,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88346788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"3480","issue":null,"first_page":"292","last_page":"296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.9249563217163086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8005949258804321},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7647916078567505},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6621187329292297},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6411325335502625},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5752555131912231},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5099273920059204},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.47531062364578247},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.42513832449913025},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.16066735982894897}],"concepts":[{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.9249563217163086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8005949258804321},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7647916078567505},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6621187329292297},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6411325335502625},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5752555131912231},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5099273920059204},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.47531062364578247},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.42513832449913025},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.16066735982894897},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/rfid-ta.2012.6404532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rfid-ta.2012.6404532","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","raw_type":"proceedings-article"},{"id":"pmh:oai:research.chalmers.se:191719","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/191719","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1524252123","https://openalex.org/W1862712733","https://openalex.org/W2129414134","https://openalex.org/W6631547823"],"related_works":["https://openalex.org/W2379281045","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2547137208","https://openalex.org/W2061637199","https://openalex.org/W2040161614"],"abstract_inverted_index":{"RFID":[0,24],"technology":[1,25],"is":[2,53],"one":[3],"of":[4,17,23,35,48,62,80,119],"the":[5,20,30,46,60,70,78,120,123,128],"most":[6],"pervasive":[7],"computing":[8],"technologies":[9],"with":[10],"important":[11,99],"advantages":[12,125],"and":[13,32],"a":[14,39,54],"wide":[15],"range":[16],"applications.":[18],"Nevertheless,":[19],"widespread":[21],"adoption":[22],"mainly":[26],"depends":[27],"on":[28],"fixing":[29],"security":[31,79,95,100],"privacy":[33],"concerns":[34],"this":[36,49,74],"technology.":[37],"Using":[38],"tagged":[40,129],"object":[41,130],"should":[42],"not":[43],"lead":[44,106],"to":[45,68,107,126],"traceability":[47,71],"object.":[50],"This":[51],"concern":[52],"challenging":[55],"issue":[56],"that":[57,66,84,105],"has":[58],"motivated":[59],"proposal":[61],"several":[63,117],"authentication":[64,82],"protocols":[65,83,104,121],"attempted":[67],"fix":[69],"problem.":[72],"In":[73],"paper,":[75],"we":[76],"analyze":[77],"three":[81],"have":[85],"been":[86],"recently":[87],"proposed":[88,113],"by":[89],"Morshed":[90],"et":[91],"al.":[92],"[2].":[93],"Our":[94],"analysis":[96],"clearly":[97],"highlights":[98],"pitfalls":[101],"in":[102],"these":[103],"their":[108],"vulnerability":[109],"against":[110],"traceability.":[111],"The":[112],"attacks":[114],"require":[115],"only":[116],"runs":[118],"while":[122],"adversary's":[124],"trace":[127],"are":[131],"maximal.":[132]},"counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
