{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:09:45Z","timestamp":1743034185792,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_2","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"21-29","source":"Crossref","is-referenced-by-count":2,"title":["A Robust and Secure RFID-Based Pedigree System (Short Paper)"],"prefix":"10.1007","author":[{"given":"Chiu C.","family":"Tan","sequence":"first","affiliation":[]},{"given":"Qun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Avoine, G.: \n                    \n                      http:\/\/lasecwww.epfl.ch\/~gavoine\/rfid\/"},{"key":"2_CR2","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks \u2013 SecureComm, Athens, Greece. IEEE, Los Alamitos (2005)"},{"key":"2_CR3","first-page":"83","volume-title":"ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006)","author":"H. Gonzalez","year":"2006","unstructured":"Gonzalez, H., Han, J., Li, X., Klabjan, D.: Warehousing and analyzing massive rfid data sets. In: ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), Washington, DC, USA, p. 83. IEEE Computer Society, Los Alamitos (2006)"},{"key":"2_CR4","first-page":"184","volume":"8","author":"T. Hassan","year":"2006","unstructured":"Hassan, T., Chatterjee, S.: A taxonomy for rfid. HICSS\u00a08, 184 (2006)","journal-title":"HICSS"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1080793.1080805","volume-title":"WiSe 2005: Proceedings of the 4th ACM workshop on Wireless security","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Strengthening EPC tags against cloning. In: WiSe 2005: Proceedings of the 4th ACM workshop on Wireless security, pp. 67\u201376. ACM Press, New York (2005)"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Computing\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Computing"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"2_CR8","unstructured":"Texas Instruments Incorporated. Securing the pharmaceutical supply chain with rfid and public-key infrastructure (PKI) technologies, \n                    \n                      http:\/\/www.ti.com\/rfid\/docs\/customer\/eped-form.shtml"},{"key":"2_CR9","unstructured":"MobileMagazine, \n                    \n                      http:\/\/www.mobilemag.com\/content\/100\/104\/c2607\/"},{"key":"2_CR10","unstructured":"Nextel, \n                    \n                      http:\/\/www.nextel.com\/en\/solutions\/special_devices\/roadrunner.shtml"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2006.17","volume":"5","author":"M. Rieback","year":"2006","unstructured":"Rieback, M., Crispo, B., Tanenbaum, A.: The evolution of RFID security. IEEE Pervasive Computing\u00a05(1), 62\u201369 (2006)","journal-title":"IEEE Pervasive Computing"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1145\/1066677.1067041","volume-title":"SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing","author":"T. Staake","year":"2005","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of rfid in anti-counterfeiting. In: SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing, pp. 1607\u20131612. ACM Press, New York (2005)"},{"key":"2_CR13","unstructured":"Yoshida, J.: Tests reveal e-passport security flaw. EE Times (2004)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:07:15Z","timestamp":1566763635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11935308_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}