{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:11Z","timestamp":1725978371608},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_29","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T13:45:41Z","timestamp":1526478341000},"page":"290-299","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TRMA: An Efficient Approach for Mutual Authentication of RFID Wireless Systems"],"prefix":"10.1007","author":[{"given":"R.","family":"Anusha","sequence":"first","affiliation":[]},{"given":"V.","family":"Veena Devi Shastrimath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TNET.2014.2386318","volume":"24","author":"M Chen","year":"2016","unstructured":"Chen, M., et al.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE\/ACM Trans. Network. (TON) 24(2), 703\u2013716 (2016)","journal-title":"IEEE\/ACM Trans. Network. (TON)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2013.10.014","volume":"41","author":"L Gao","year":"2014","unstructured":"Gao, L., et al.: An ultra lightweight RFID authentication protocol with CRC and permutation. J. Netw. Comput. Appl. 41, 37\u201346 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"29_CR4","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1109\/TIE.2009.2037098","volume":"57","author":"Y-J Huang","year":"2010","unstructured":"Huang, Y.-J., et al.: Hardware implementation of RFID mutual authentication protocol. IEEE Trans. Ind. Electron. 57(5), 1573\u20131582 (2010)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Feldhofer, M.: An authentication protocol in a security layer for RFID smart tags. In: Proceedings of the 12th IEEE Mediterranean Electro-technical Conference, MELECON 2004, vol. 2. IEEE (2004)","DOI":"10.1109\/MELCON.2004.1347041"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Maarof, A., et al.: Authentication protocol conforming to EPC class-1 Gen-2 standard. In: International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)","DOI":"10.1109\/ACOSIS.2016.7843915"},{"issue":"10","key":"29_CR7","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TMC.2012.176","volume":"12","author":"Y-C Lai","year":"2013","unstructured":"Lai, Y.-C., et al.: A novel query tree protocol with bit tracking in RFID tag identification. IEEE Trans. Mob. Comput. 12(10), 2063\u20132075 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"7","key":"29_CR8","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/CC.2014.6895391","volume":"11","author":"X Liu","year":"2014","unstructured":"Liu, X., et al.: An adaptive tag anti-collision protocol in RFID wireless systems. China Commun. 11(7), 117\u2013127 (2014)","journal-title":"China Commun."},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TASE.2008.2007266","volume":"6","author":"Y Maguire","year":"2009","unstructured":"Maguire, Y., Pappu, R.: An optimal Q-algorithm for the ISO 18000-6C RFID protocol. IEEE Trans. Autom. Sci. Eng. 6(1), 16\u201324 (2009)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"12","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1049\/iet-com.2010.0625","volume":"5","author":"H Ning","year":"2011","unstructured":"Ning, H., et al.: Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun. 5(12), 1755\u20131768 (2011)","journal-title":"IET Commun."},{"issue":"5","key":"29_CR11","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TMTT.2009.2017323","volume":"57","author":"S Preradovic","year":"2009","unstructured":"Preradovic, S., et al.: Multiresonator-based chipless RFID system for low-cost item tracking. IEEE Trans. Microw. Theor. Tech. 57(5), 1411\u20131419 (2009)","journal-title":"IEEE Trans. Microw. Theor. Tech."},{"issue":"2","key":"29_CR12","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TC.2015.2423671","volume":"65","author":"K Sakai","year":"2016","unstructured":"Sakai, K., et al.: A novel coding scheme for secure communications in distributed RFID systems. IEEE Trans. Comput. 65(2), 409\u2013421 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"29_CR13","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TDSC.2009.26","volume":"8","author":"H-M Sun","year":"2011","unstructured":"Sun, H.-M., Ting, W.-C., Wang, K.-H.: On the security of Chien\u2019s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secure Comput. 8(2), 315\u2013317 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"29_CR14","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","volume":"7","author":"CC Tan","year":"2008","unstructured":"Tan, C.C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 7(4), 1400\u20131407 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"29_CR15","first-page":"2404","volume":"45","author":"J Yin","year":"2010","unstructured":"Yin, J., et al.: A system-on-chip EPC Gen-2 passive UHF RFID tag with embedded temperature sensor. IEEE J. Solid-State Circ. 45(11), 2404\u20132420 (2010)","journal-title":"IEEE J. Solid-State Circ."},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Yu, J., et al.: Finding needles in a haystack: missing tag detection in large RFID systems. IEEE Trans. Commun. (2017)","DOI":"10.1007\/978-3-319-91992-8_4"},{"issue":"11","key":"29_CR17","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1109\/TWC.2013.092013.121322","volume":"12","author":"L Zhang","year":"2013","unstructured":"Zhang, L., Zhang, J., Tang, X.: Assigned tree slotted aloha RFID tag anti-collision protocols. IEEE Trans. Wirel. Commun. 12(11), 5493\u20135505 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"9","key":"29_CR18","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.1109\/TCOMM.2010.080310.090421","volume":"58","author":"L Zhu","year":"2010","unstructured":"Zhu, L., Yum, T.-S.P.: The optimal reading strategy for EPC Gen-2 RFID anti-collision systems. IEEE Trans. Commun. 58(9), 2725\u20132733 (2010)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"29_CR19","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNET.2012.2212454","volume":"21","author":"Y Zheng","year":"2013","unstructured":"Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. IEEE\/ACM Trans. Network. (TON) 21(3), 924\u2013934 (2013)","journal-title":"IEEE\/ACM Trans. Network. (TON)"},{"issue":"9","key":"29_CR20","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1109\/TC.2007.1050","volume":"56","author":"Y Oren","year":"2007","unstructured":"Oren, Y., Shamir, A.: Remote password extraction from RFID tags. IEEE Trans. Comput. 56(9), 1292\u20131296 (2007)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"29_CR21","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TPDS.2007.1098","volume":"18","author":"J Myung","year":"2007","unstructured":"Myung, J., et al.: Tag-splitting: adaptive collision arbitration protocols for RFID tag identification. IEEE Trans. Parallel Distrib. Syst. 18(6), 763\u2013775 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Luo, W., et al.: Efficient missing tag detection in RFID systems. In: IEEE INFOCOM 2011 Proceedings (2011)","DOI":"10.1109\/INFCOM.2011.5935181"},{"issue":"8","key":"29_CR23","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390\u20131397 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Han, H., et al.: Counting RFID tags efficiently and anonymously. In: IEEE INFOCOM 2010 Proceedings (2010)","DOI":"10.1109\/INFCOM.2010.5461944"},{"issue":"2","key":"29_CR25","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2012.2235834","volume":"8","author":"R Doss","year":"2013","unstructured":"Doss, R., Zhou, W., Shui, Yu.: Secure RFID tag ownership transfer based on quadratic residues. IEEE Trans. Inf. Forensics Secur. 8(2), 390\u2013401 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"29_CR26","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TII.2011.2166783","volume":"8","author":"B Fabian","year":"2012","unstructured":"Fabian, B., Ermakova, T., Muller, C.: SHARDIS: a privacy-enhanced discovery service for RFID-based product information. IEEE Trans. Industr. Inf. 8(3), 707\u2013718 (2012)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T23:53:07Z","timestamp":1571356387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}