{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:59:34Z","timestamp":1743058774794,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030607982"},{"type":"electronic","value":"9783030607999"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60799-9_48","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T14:04:35Z","timestamp":1602597875000},"page":"539-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Offline State Management Technology of Metered Assets Based on Internet of Things"],"prefix":"10.1007","author":[{"family":"Linhu","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Yong","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Jimin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"issue":"3","key":"48_CR1","first-page":"87","volume":"43","author":"J Xiong","year":"2017","unstructured":"Xiong, J., Wang, J.: Research on RFID secure two-way authentication protocol based on HASH function. China Test 43(3), 87\u201390 (2017)","journal-title":"China Test"},{"issue":"1","key":"48_CR2","first-page":"196","volume":"43","author":"B Liu","year":"2017","unstructured":"Liu, B., Liu, N., Yang, Y., et al.: Bidirectional authentication protocol for radio frequency identification based on elliptic curve cryptography. Comput. Eng. 43(1), 196\u2013200 (2017)","journal-title":"Comput. Eng."},{"issue":"2","key":"48_CR3","first-page":"15","volume":"53","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Yang, L., Yang, Y.: Scalable RFID two-way authentication protocol based on Rabin algorithm. Comput. Eng. Appl. 53(2), 15\u201320 (2017)","journal-title":"Comput. Eng. Appl."},{"issue":"6","key":"48_CR4","first-page":"1284","volume":"50","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Xie, Y., Shi, Y., et al.: Research and implementation of lightweight RFID security protocol based on SASI protocol. Commun. Technol. 50(6), 1284\u20131289 (2017)","journal-title":"Commun. Technol."},{"issue":"24","key":"48_CR5","first-page":"233","volume":"32","author":"X Li","year":"2018","unstructured":"Li, X., Sun, C., Zheng, W.: RFID two-way authentication protocol based on pseudo-random function. Comput. Eng. Appl. 32(24), 233\u2013243 (2018)","journal-title":"Comput. Eng. Appl."},{"issue":"9","key":"48_CR6","first-page":"136","volume":"53","author":"Y Ma","year":"2017","unstructured":"Ma, Y., Liu, D.: An improved RFID two-way authentication protocol for backward security. Comput. Eng. Appl. 53(9), 136\u2013140 (2017)","journal-title":"Comput. Eng. Appl."},{"issue":"7","key":"48_CR7","first-page":"1697","volume":"38","author":"T Su","year":"2017","unstructured":"Su, T.: Security authentication protocol for passive RFID. Comput. Eng. Des. 38(7), 1697\u20131701 (2017)","journal-title":"Comput. Eng. Des."},{"issue":"4","key":"48_CR8","first-page":"93","volume":"44","author":"P Wang","year":"2018","unstructured":"Wang, P., Zhou, Z., Li, J.: An improved scheme of RFID security authentication protocol without backend database. J. Front. Comput. Sci. Technol. 44(4), 93\u2013100 (2018)","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"48_CR9","unstructured":"Zhu, X.: Research on anti-collision of RFID tags with two-slot algorithm in ship communication network. Ship Sci. Technol. (8), 76\u201378 (2017)"},{"issue":"2","key":"48_CR10","first-page":"53","volume":"38","author":"N Dong","year":"2017","unstructured":"Dong, N., Ma, W., Chen, X., et al.: Research on fall prevention management system based on BIM and RFID. Constr. Econ. 38(2), 53\u201357 (2017)","journal-title":"Constr. Econ."},{"issue":"9","key":"48_CR11","first-page":"317","volume":"34","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Sun, L., Zhang, X.: Research and application of anti-counterfeit authentication system based on RFID and NFC technology. J. Comput. Appl. Softw. 34(9), 317\u2013321 (2017)","journal-title":"J. Comput. Appl. Softw."},{"issue":"8","key":"48_CR12","first-page":"173","volume":"43","author":"Q Su","year":"2017","unstructured":"Su, Q., Li, Q., Peng, J., et al.: Wireless key generation protocol for encrypted RFID system based on pseudonym identification. Comput. Eng. 43(8), 173\u2013177 (2017)","journal-title":"Comput. Eng."},{"issue":"2","key":"48_CR13","first-page":"76","volume":"27","author":"H Liu","year":"2017","unstructured":"Liu, H., Cao, K., An, Q.: Research on anti-counterfeiting mechanism of RFID-based traceability system products. J. Yulin Univ. 27(2), 76\u201378 (2017)","journal-title":"J. Yulin Univ."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60799-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T14:21:41Z","timestamp":1602598901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60799-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030607982","9783030607999"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60799-9_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2020\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}