{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T22:06:27Z","timestamp":1657404387091},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,7,24]],"date-time":"2009-07-24T00:00:00Z","timestamp":1248393600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10796-009-9213-9","type":"journal-article","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T11:48:04Z","timestamp":1248349684000},"page":"481-483","source":"Crossref","is-referenced-by-count":2,"title":["Guest editorial: Advances in RFID technology"],"prefix":"10.1007","volume":"12","author":[{"given":"Quan Z.","family":"Sheng","sequence":"first","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Zongwei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jen-Yao","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Zakaria","family":"Maamar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,24]]},"reference":[{"key":"9213_CR1","unstructured":"Choi, J.-W., & Oh, D.-I. (2009). Tag-only aging-counter localization for the R-LIM2 system. Information Systems Frontiers, forthcoming."},{"key":"9213_CR2","unstructured":"Hsu, C.-H., Chao, H.-C., & Park, J. H. (2009). Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. Information Systems Frontiers, forthcoming."},{"key":"9213_CR3","unstructured":"Li, X., Liu, J., Sheng, Q. Z., Zeadally, S., & Zhong, W. (2009). TMS-RFID: Temporal management of large-scale RFID applications. Information Systems Frontiers, forthcoming."},{"key":"9213_CR4","unstructured":"Lopez, T. S., Ranasinghe, D. C., Patkai, B., & McFarlane, D. (2009). Taxonomy, technology and applications of smart objects. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR5","unstructured":"Meng, S., Chiu, D., Kafeza, E., Liu, W., & Li, Q.(2009). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR6","unstructured":"Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2009). Classifying RFID attacks and defenses. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR7","unstructured":"Schwieren, J., & Vossen, G. (2009). ID-services: An RFID middleware architecture for mobile applications. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR8","unstructured":"Sengupta, A., & Schiller, S. Z. (2009). FlexRFID: A design, development and deployment framework for RFID-based business applications. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR9","doi-asserted-by":"crossref","unstructured":"Sheng, Q. Z., Zeadally, S., Luo, Z., Jung, J.-Y., & Maamar, Z. (2009). Ubiquitous RFID: Where are we? Information Systems Frontiers Special Issue on RFID, forthcoming.","DOI":"10.1007\/s10796-009-9212-x"},{"key":"9213_CR10","unstructured":"Ziekow, H., & G\u00fcnther, O. (2009). Sharing RFID and complex event data among organizations. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR11","unstructured":"Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2009). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers Special Issue on RFID, forthcoming."},{"key":"9213_CR12","unstructured":"Zuo, Y. (2009). Secure and private search protocol for RFID systems. Information Systems Frontiers Special Issue on RFID, forthcoming."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9213-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9213-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9213-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:36:14Z","timestamp":1559262974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9213-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,24]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["9213"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9213-9","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,24]]}}}