{ "labelLang" : "hun", "responseDate" : "2024-03-29 11:53", "content" : { "otype" : "JournalArticle", "mtid" : 30861808, "status" : "APPROVED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2020-02-10T13:19:04.340+0000", "lastModified" : "2019-10-31T11:30:18.887+0000", "created" : "2019-10-25T11:18:19.888+0000", "creator" : { "otype" : "Admin", "mtid" : 10014110, "link" : "/api/admin/10014110", "label" : "Szmolyán Mária (BME admin 5 - INAKTÍV)", "familyName" : "Szmolyán", "givenName" : "Mária", "published" : true, "oldId" : 10014110, "snippet" : true }, "lastDuplumOK" : "2019-10-31T11:30:18.919+0000", "lastDuplumSearch" : "2019-10-31T11:30:18.919+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000059, "link" : "/api/subtype/10000059", "label" : "Szakcikk (Folyóiratcikk)", "name" : "Szakcikk", "nameEng" : "Article", "docType" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "listPosition" : 101, "published" : true, "oldId" : 10000059, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Rekleitis, E.", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 88332499, "link" : "/api/authorship/88332499", "label" : "Rekleitis, E.", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "corresponding" : true, "familyName" : "Rekleitis", "givenName" : "E.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 88332500, "link" : "/api/authorship/88332500", "label" : "Rizomiliotis, P.", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : false, "corresponding" : true, "familyName" : "Rizomiliotis", "givenName" : "P.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 88332501, "link" : "/api/authorship/88332501", "label" : "Gritzalis, S.", "listPosition" : 3, "share" : 0.0, "first" : false, "last" : true, "corresponding" : true, "familyName" : "Gritzalis", "givenName" : "S.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "How to protect security and privacy in the IoT: A policy-based RFID tag management protocol", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 16001705, "link" : "/api/publicationidentifier/16001705", "label" : "DOI: 10.1002/sec.400", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "idValue" : "10.1002/sec.400", "realUrl" : "https://doi.org/10.1002%2Fsec.400", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 16001704, "link" : "/api/publicationidentifier/16001704", "label" : "Scopus: 84911867979", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "idValue" : "84911867979", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84911867979", "published" : false, "snippet" : true } ], "journal" : { "otype" : "Journal", "mtid" : 10015759, "link" : "/api/journal/10015759", "label" : "SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122", "pIssn" : "1939-0114", "eIssn" : "1939-0122", "reviewType" : "REVIEWED", "noIF" : false, "sciIndexed" : true, "scopusIndexed" : true, "lang" : "FOREIGN", "hungarian" : false, "published" : true, "oldId" : 10015759, "snippet" : true }, "volume" : "7", "issue" : "12", "firstPage" : "2669", "lastPage" : "2683", "firstPageOrInternalIdForSort" : "2669", "pageLength" : 15, "publishedYear" : 2014, "digital" : null, "printed" : null, "sourceYear" : 2019, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2020-02-10", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "ratings" : [ { "otype" : "SjrRating", "mtid" : 5541214, "link" : "/api/sjrrating/5541214", "label" : "sjr:Q3 (2014) Scopus - Computer Networks and Communications SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122", "listPos" : 314, "rankValue" : 0.74, "type" : "journal", "ratingType" : { "otype" : "RatingType", "mtid" : 10002, "link" : "/api/ratingtype/10002", "label" : "sjr", "code" : "sjr", "published" : true, "snippet" : true }, "subject" : { "otype" : "ClassificationExternal", "mtid" : 1705, "link" : "/api/classificationexternal/1705", "label" : "Scopus - Computer Networks and Communications", "published" : true, "oldId" : 1705, "snippet" : true }, "ranking" : "Q3", "published" : true, "oldId" : 5541214, "snippet" : true } ], "ratingsForSort" : "Q3", "referenceList" : "(2009), Communication to the European parliament, the council, the EESC and the committee of the regions: Internet of Things-an action plan for Europe. Technical Report, Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Jun ;\n (2010), Flying 2.0-enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology. Technical Report, European Network and Information Security Agency (ENISA) Apr ;\n Rekleitis, E., Rizomiliotis, P., Gritzalis, S., (2010) A holistic approach to RFID security and privacy, , Tokyo, Japan ;\n Radio-frequency identification (RFID): drivers, challenges and public policy considerations (2006), Organisation for Economic Co-operation and Development (OECD), Paris Mar ;\n Rekleitis, E., Rizomiliotis, P., Gritzalis, S., An agent based back-end RFID tag management system (2010) Lecture Notes in Computer Science LNCS, , Katsikas S, Lopez J (eds). Springer: Bilbao ;\n Chien, H.Y., SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity (2007) IEEE Transactions on Dependable and Secure Computing, 4, pp. 337-340 ;\n Lim, C.H., Kwon, T., Strong and robust RFID authentication enabling perfect ownership transfer (2006) ICICS, LNCS, 4307, pp. 1-20. , Ning P, Qing S, Li N (eds). Springer: Raleigh, NC ;\n Vajda, I., Buttyán, L., Lightweight authentication protocols for low-cost RFID tags (2003) Second Workshop on Security in Ubiquitous Computing-Ubicomp 2003, , Seattle, WA ;\n Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A., LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags (2006), Workshop on RFID Security-RFIDSec'06. Ecrypt: Graz ;\n Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A., M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags (2006) International Conference on Ubiquitous Intelligence and Computing-UIC'06, Lecture Notes in Computer Science, 4159, pp. 912-923. , Springer-Verlag: Wuhan and Three Gorges ;\n Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A., EMAP: an efficient mutual authentication protocol for low-cost RFID tags (2006) OTM Federated Conferences and Workshop: IS Workshop-IS'06, Lecture Notes in Computer Science, 4277, pp. 352-361. , Springer-Verlag: Montpellier ;\n Li, T., Deng, R.H., Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol (2007) Second International Conference on Availability, Reliability and Security-AReS 2007, , IEEE: Vienna, Austria ;\n Li, T., Wang, G., Security analysis of two ultra-lightweight RFID authentication protocols (2007) IFIP SEC 2007, , IFIP: Sandton, Gauteng ;\n Barasz, M., Boros, B., Ligeti, P., Loja, K., Nagy, D., Breaking LMAP (2007) Conference on RFID Security, , Malaga, Spain ;\n Barasz, M., Boros, B., Ligeti, P., Lója, K., Nagy, D., Passive attack against the M2AP mutual authentication protocol for RFID tags (2007) First International EURASIP Workshop on RFID Technology, , Vienna, Austria ;\n Chien, H.Y., Huang, C.W., Security of ultra-lightweight RFID authentication protocols and its improvements (2007) SIGOPS Operating System Review, 41 (4), pp. 83-86 ;\n Hernandez-Castro, J.C., Estevez-Tapiador, J., Peris-Lopez, P., Clark, J.A., Talbi, E.G., Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol (2009) Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium-IPDPS, , Rome, Italy, 2009 ;\n Phan, R.C.W., Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI (2009) IEEE Transactions on Dependable and Secure Computing, 6, pp. 316-320 ;\n Alomair, B., Poovendran, R., On the authentication of RFID systems with bitwise operations (2008) New Technologies, Mobility and Security NTMS'08, pp. 1-6. , IEEE: Tangier ;\n Rizomiliotis, P., Rekleitis, E., Gritzalis, S., Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags (2009) Communications Letters, 13, pp. 274-276. , April ;\n Song, B., Mitchell, C.J., RFID authentication protocol for low-cost tags (2008) ACM Conference on Wireless Network Security, WiSec'08, pp. 140-147. , Gligor VD, Hubaux J, Poovendran R (eds). ACM Press: Alexandria, VA ;\n Molnar, D., Soppera, A., Wagner, D., A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags (2006) SAC, LNCS, 3897, pp. 276-290. , Preneel B, Tavares SE (eds). Springer: Kingston ;\n Dimitriou, T., RFIDDOT: RFID delegation and ownership transfer made simple (2008) Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm '08, , 34:1-34:8, ACM: New York, NY ;\n Fouladgar, S., Afifi, H., An efficient delegation and transfer of ownership protocol for RFID tags (2007) First International EURASIP Workshop on RFID Technology, , Vienna, Austria ;\n Jin, Y., Sun, H., Chen, Z., Hash-based tag ownership transfer protocol against traceability (2009) IEEE International Conference on E-Business Engineering, 0, pp. 487-492 ;\n Zuo, Y., Changing hands together: a secure group ownership transfer protocol for rfid tags (1899) Hawaii International Conference on System Sciences, 0, pp. 1-10 ;\n Saito, J., Imamoto, K., Sakurai, K., Reassignment scheme of an RFID tags key for owner transfer (2005) EUC Workshops, LNCS, 3823, pp. 1303-1312. , Enokido T, Yan L, Xiao B, Kim D, Dai YS, Yang LT (eds). Springer: Berlin, Heidelberg ;\n Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O., An efficient and secure RFID security method with ownership transfer (2007) Computational Intelligence and Security: International Conference, CIS 2006, pp. 778-787. , Guangzhou, China, November 3-6, 2006, Revised Selected Papers. Springer ;\n Koralalage, K.H., Reza, S.M., Miura, J., Goto, Y., Cheng, J., POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (2007) Proceedings of the 2007 ACM Symposium on Applied Computing SAC'07, pp. 270-275. , ACM: Seoul, Korea ;\n Song, B., RFID tag ownership transfer (2008) Conference on RFID Security, Budapest, Hungary ;\n van Deursen, T., Mauw, S., Radomiroviä, S., Vullers, P., Secure ownership and ownership transfer in RFID systems (2009) Proceedings 14th European Symposium on Research in Computer Security (ESORICS'09), Lecture Notes in Computer Science, 5789, pp. 637-654. , Springer ;\n Song, B., Mitchell, C.J., Scalable RFID security protocols supporting tag ownership transfer (2011) Computer Communications, 34 (4), pp. 556-566. , Apr ;\n Bishop, M., (2002) Computer Security: Art and Science, , Addison-Wesley Professional: Boston MA, USA ;\n Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R., (2007) Role-based Access Control, Second Edition, , (2nd edn). Artech House: Norwood MA, USA ;\n Grummt, E., Müller, M., Fine-grained access control for EPC information services (2008) Proceedings of the 1st International Conference on the Internet of Things, pp. 35-49. , Springer-Verlag: Zurich ;\n (2011), www.oasis-open.org/committees/xacml, OASIS eXtensible access control markup language (XACML) TC., last retrieved March ;\n Kumaraguru, P., Cranor, F.L., Lobo, J., Calo, S.B., A survey of privacy policy languages (2007) SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security, , ACM: New York, NY ;\n Stepien, B., Felty, A., Matwin, S., A non-technical user-oriented display notation for XACML conditions (2009) E-Technologies: Innovation in an Open World, Lecture Notes in Business Information Processing, 26, pp. 53-64. , Aalst W, Mylopoulos J, Sadeh NM, Shaw MJ, Szyperski C, Babin G, Kropf P, Weiss M (eds). Springer: Berlin, Heidelberg ;\n Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R., Protecting privacy during on-line trust negotiation (2003) Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, pp. 129-143. , Springer-Verlag: San Francisco, CA ;\n Winslett, M., An introduction to trust negotiation (2003) Proceedings of the 1st International Conference on Trust Management, pp. 275-283. , Springer-Verlag: Heraklion, Crete ;\n (2004) Data elements and interchange formats-information interchange-representation of dates and times, , ISO: Geneva ;\n Multicast source authentication transform introduction (2005), http://tools.ietf.org/html/rfc4082,http://tools.ietf.org/html/rfc4082, Jun, last retrieved March 2011 ;\n Dolev, D., Yao, A.C., On the security of public key protocols (1981) Foundations of Computer Science, Annual IEEE Symposium on, pp. 350-357. , Vol. 0. IEEE Computer Society: Los Alamitos, CA ;\n Avoine, G., Adversary model for radio frequency identification (2005), EPFL, Lausanne, Switzerland Sep ;\n Vaudenay, S., On privacy models for RFID (2007) Advances in Cryptology-Asiacrypt 2007, pp. 68-87. , Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg ;\n Alomair, B., Poovendran, R., Privacy versus scalability in radio frequency identification systems (2010) Computer Communications, 33 (18), pp. 2155-2163. , Dec ;\n Molnar, D., Soppera, A., Wagner, D., Privacy for rfid through trusted computing (2005) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 31-34. , WPES '05, ACM: New York, NY ;\n Avoine, G., Scalability issues in privacy-compliant RFID protocols (2008) RFID Security: Techniques, Protocols and System-On-Chip Design, pp. 191-228. , Kitsos P, Zhang Y (eds). Springer: US ;\n Li, T., Wang, G., SLMAP - A Secure ultra-Lightweight RFID mutual authentication protocols (2007) Proceedings of Chinacrypt'07, pp. 19-22. , Science Press: Cheng Du, Chin", "hasCitationDuplums" : false, "userChangeableUntil" : "2020-01-29T11:30:18.648+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 2, "ownerInstituteCount" : 10, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "hasQualityFactor" : true, "link" : "/api/publication/30861808", "label" : "Rekleitis E. et al. How to protect security and privacy in the IoT: A policy-based RFID tag management protocol. (2014) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122 7 12 2669-2683", "template" : "