{"id":"https://openalex.org/W2395907358","doi":"https://doi.org/10.3233/978-1-61499-462-6-41","title":"An Authentication Scheme for Ubiquitous RFID Systems","display_name":"An Authentication Scheme for Ubiquitous RFID Systems","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2395907358","doi":"https://doi.org/10.3233/978-1-61499-462-6-41","mag":"2395907358"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-462-6-41","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-462-6-41","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116337894","display_name":"Yeh Kuo-Hui","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yeh Kuo-Hui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116337895","display_name":"Chen YuShan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen YuShan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5038643399","display_name":"Wang Fan-Wei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang Fan-Wei","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116337894"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17582418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9117000102996826,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9117000102996826,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T13924","display_name":"Internet of Things and Social Network Interactions","score":0.9085000157356262,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6029843091964722},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5977160930633545},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5787799954414368},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4798938035964966},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.452555775642395},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.20142841339111328},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08830386400222778}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6029843091964722},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5977160930633545},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5787799954414368},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4798938035964966},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.452555775642395},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.20142841339111328},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08830386400222778},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-61499-462-6-41","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-462-6-41","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2242172122","https://openalex.org/W2912135041"],"abstract_inverted_index":{"In":[0,96,140],"order":[1],"to":[2,45,119],"fulfill":[3],"system":[4],"security":[5,48],"and":[6,49,59,72,84,146],"computation":[7],"limitation":[8],"of":[9,19,28,87,116,135],"low-cost":[10],"RF":[11],"tags":[12],"at":[13,124],"the":[14,17,20,29,47,85,88,121,125,128,133],"same":[15],"time,":[16],"research":[18],"lightweight":[21],"RFID":[22,152],"authentication":[23,41,149],"has":[24],"promptly":[25],"become":[26],"one":[27],"hottest":[30],"topics":[31],"in":[32],"recent":[33],"years.":[34],"Recently,":[35],"Morshed":[36],"et":[37,57,61],"al.":[38,58,62],"proposed":[39,130],"an":[40],"scheme,":[42],"called":[43],"SUAP3,":[44],"achieve":[46],"efficiency":[50],"under":[51],"ubiquitous":[52,148],"RFID-based":[53],"systems.":[54,155],"Later,":[55],"Safkhani":[56],"Wang":[60],"had":[63],"demonstrated":[64],"that":[65],"SUAP3":[66,136],"is":[67,137],"insecure":[68],"against":[69],"full-disclosure":[70],"attack":[71,105],"tag":[73],"traceability":[74],"attack.":[75],"However,":[76],"these":[77],"attacks":[78,90],"are":[79,91],"based":[80,153],"on":[81],"powerful":[82],"assumptions,":[83],"feasibilities":[86],"two":[89],"thus":[92],"a":[93,101,114,144],"little":[94],"doubtful.":[95],"this":[97],"paper,":[98],"we":[99,142],"present":[100,143],"real":[102],"passive":[103],"tag-tracking":[104],"without":[106],"any":[107],"specific":[108],"assumptions.":[109],"An":[110],"adversary":[111],"can":[112],"exploit":[113],"series":[115],"challenge-response":[117],"procedures":[118],"derive":[120],"secrets":[122],"maintained":[123],"tag.":[126],"With":[127],"cryptanalysis":[129],"by":[131],"us,":[132],"insecurity":[134],"truly":[138],"proved.":[139],"addition,":[141],"novel":[145],"robust":[147],"scheme":[150],"for":[151],"application":[154]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
