{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:08:55Z","timestamp":1774627735083,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642353611","type":"print"},{"value":"9783642353628","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_26","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"339-351","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Anti-collision Algorithm for ISO15693 RFID Systems"],"prefix":"10.1007","author":[{"given":"Leyi","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xiaorui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"26_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzoria","year":"2010","unstructured":"Atzoria, L., Ierab, A., Morabitoc, G.: The Internet of Things: A survey. Computer Networks\u00a054(15), 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013393 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"SPC","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A. Mitrokotsa","year":"2009","unstructured":"Mitrokotsa, A., Rieback, M., Tanenbaum, A.: Classifying RFID attacks and defenses. Information Systems Frontiers\u00a012(5), 491\u2013505 (2009)","journal-title":"Information Systems Frontiers"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Sarma","year":"2003","unstructured":"Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: Pervasive Computing & Communications Workshops, pp. 149\u2013153 (2004)","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-32004-3_9","volume-title":"Security in Pervasive Computing","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 70\u201384. Springer, Heidelberg (2005)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/11424758_65","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S.M. Lee","year":"2005","unstructured":"Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03480, pp. 619\u2013627. Springer, Heidelberg (2005)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/978-3-540-30121-9_84","volume-title":"Embedded and Ubiquitous Computing","author":"J. Saito","year":"2004","unstructured":"Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol.\u00a03207, pp. 879\u2013890. Springer, Heidelberg (2004)"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.aei.2006.09.001","volume":"21","author":"K. Domdouzis","year":"2007","unstructured":"Domdouzis, K., Kumar, B., Anumba, C.: Radio-Frequency Identification (RFID) applications: A brief introduction. Advanced Engineering Informatics\u00a021, 350\u2013355 (2007)","journal-title":"Advanced Engineering Informatics"},{"issue":"7","key":"26_CR12","doi-asserted-by":"publisher","first-page":"2796","DOI":"10.1109\/18.737513","volume":"44","author":"N. David","year":"1998","unstructured":"David, N., Stephon, V.: Multi-access fading channels Part 1: Polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transaction on Information Theory\u00a044(7), 2796\u20132815 (1998)","journal-title":"IEEE Transaction on Information Theory"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1009544223331","volume":"7","author":"Y. Jamil","year":"2000","unstructured":"Jamil, Y., Li, Y.: Block reservation time division multiple access protocol for a high capacity wireless network. International Journal of Wireless Information Networks\u00a07(4), 211\u2013220 (2000)","journal-title":"International Journal of Wireless Information Networks"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: IEEE INFOCOM 2005, Poster Session, pp. 1096\u20131101 (2005)","DOI":"10.1109\/TMM.2006.879817"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Ali, K., Hassanein, H., Taha, A.: RFID anti-collision protocol for dense passive tag environments, pp. 819\u2013824. IEEE Computer Society (2007)","DOI":"10.1109\/LCN.2007.140"},{"key":"26_CR16","first-page":"29","volume":"15","author":"L. Jiang","year":"2007","unstructured":"Jiang, L., Lu, G., Xin, Y.: Research on anti-collision algorithm in radio frequency identification system. Computer Engineering and Applications\u00a015, 29\u201332 (2007)","journal-title":"Computer Engineering and Applications"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons (2003)","DOI":"10.1002\/0470868023"},{"issue":"29","key":"26_CR18","doi-asserted-by":"publisher","first-page":"2150","DOI":"10.1016\/j.comcom.2005.12.011","volume":"11","author":"D. Shih","year":"2006","unstructured":"Shih, D., Sun, P., Yen, D., Huang, S.: Taxonomy and survey of RFID anti-collision protocols. Computer Communication\u00a011(29), 2150\u20132166 (2006)","journal-title":"Computer Communication"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Law, C., Lee, K., Siu, K.: Efficient memory-less protocol for tag identification. In: Proc. 4th International Workshop on DIALM, pp. 75\u201384 (2000)","DOI":"10.1145\/345848.345865"},{"key":"26_CR20","first-page":"133","volume":"28","author":"H. Du","year":"2006","unstructured":"Du, H., Xu, K., Wang, W.: An anti-collision algorithm based on binary-tree searching of backtracking. Journal of Yunnan University\u00a028, 133\u2013136 (2006)","journal-title":"Journal of Yunnan University"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2528\/PIERB08012304","volume":"4","author":"X. Shi","year":"2008","unstructured":"Shi, X., Huang, Q., Wei, F.: An enhanced binary anti-collision algorithm of backtracking in RFID system. Progress In Electromagnetics Research B\u00a04, 263\u2013271 (2008)","journal-title":"Progress In Electromagnetics Research B"},{"key":"26_CR22","unstructured":"Jacomet, M., Ehrsam, A., Gehrig, U.: Contactless identification device with anticollision algorithm. In: Proceedings of the IEEE Conference on Circuits, Systems, Computer and Communications, pp. 75\u201384 (2000)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Conference on Computer and Communications Security, pp. 27\u201330 (2003)","DOI":"10.1145\/948109.948126"},{"key":"26_CR24","unstructured":"Choi, H., Cha, J., Kim, J.: Fast wireless anti-collision algorithm in ubiquitous id system. In: Proc. of the 60th IEEE Vehicular Technology Conference, pp. 4589\u20134592 (2004)"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Alsalih, W., Ali, K., Hassanein, H.: Optimal distance-based clustering for tag anti-collision in RFID systems. In: Proc. of 33rd IEEE Conference on Local Computer Networks (LCN), pp. 266\u2013273 (2008)","DOI":"10.1109\/LCN.2008.4664179"},{"key":"26_CR26","unstructured":"Kim, S., Shin, M., Park, P.: A new tree-based tag anticollision protocol for RFID systems. In: Proc. of the 2006 International Conference on Communications in Computing, pp. 83\u201386 (2006)"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, F., Jin, D., Huang, C., Min, H.: Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proc. of the 5th ASICON, pp. 1213\u20131217 (2003)","DOI":"10.1109\/ICASIC.2003.1277432"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. In: ISLPED 2004: Proc. of the 2004 International Symposium on Low Power Electronics and Design, pp. 357\u2013362 (2004)","DOI":"10.1145\/1013235.1013321"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Liu, L., Xie, Z., Xi, J., Lai, S.: An improved anti-collision algorithm in RFID system. In: Proc. of 2nd International Conference on Mobile Technology, Applications and System, pp. 1\u20135 (2005)","DOI":"10.1109\/MTAS.2005.243788"},{"key":"26_CR30","unstructured":"Law, C., Lee, K., Siu, K.: Scanning-based pre-processing for enhanced RFID tag anti-collision protocols. In: ISCIT 2006: Proc. of the 2006 International Symposium on Communications and Information Technologies, pp. 75\u201384 (2006)"},{"key":"26_CR31","first-page":"170","volume":"24","author":"L. Zhao","year":"2008","unstructured":"Zhao, L., Zhou, C.: An anti-collision Arithmetic based on ISO15693 protocol and its realization. Microcomputer Information\u00a024, 170\u2013172 (2008)","journal-title":"Microcomputer Information"},{"key":"26_CR32","unstructured":"International Standards Organization. ISO\/IEC 15693-2: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part2: Air interface and initialization (2000)"},{"key":"26_CR33","unstructured":"International Standards Organization. ISO\/IEC 15693-3: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part 3: Anticollision and transmission protocol (2000)"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. IEEE Security and Privacy for Emerging Areas in Communications, Networks, 59\u201366 (2005)","DOI":"10.1109\/SECURECOMM.2005.4"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:18:12Z","timestamp":1745367492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}