{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:08:12Z","timestamp":1754107692556},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,9,12]],"date-time":"2010-09-12T00:00:00Z","timestamp":1284249600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s11277-010-0139-9","type":"journal-article","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:31:47Z","timestamp":1284172307000},"page":"393-413","source":"Crossref","is-referenced-by-count":7,"title":["An RFID Based Multi-batch Supply Chain Systems"],"prefix":"10.1007","volume":"63","author":[{"given":"Yuan-Hung","family":"Lien","sequence":"first","affiliation":[]},{"given":"Cheng-Ter","family":"Hsi","sequence":"additional","affiliation":[]},{"given":"Xuefei","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Jung-Hui","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Henry Ker-Chang","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,12]]},"reference":[{"key":"139_CR1","unstructured":"Bolotnyy L., & Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. In International conference on mobile and ubiquitous systems (pp. 1\u20134). (July, 2006)."},{"key":"139_CR2","unstructured":"Burmester, M., de Medeiros, B., & Motta, R. (2008). Provably secure grouping-proofs for RFID tags, CARDIS 2008 (pp. 176\u2013190). (September, 2008)."},{"key":"139_CR3","doi-asserted-by":"crossref","unstructured":"Cai, S., Li, T., Li, Y., & Deng, R. H. (2009). Ensuring dual security modes in RFID-enabled supply chain systems. In This fifth information security practice and experience conference (ISPEC\u201909) (pp. 372\u2013383). China. April 13\u201315, 2009","DOI":"10.1007\/978-3-642-00843-6_32"},{"key":"139_CR4","unstructured":"EPCglobal Inc. (2007). Class-1 generation-2 UHF RFID protocol for communications at 860\u00a0MHz\u2013960\u00a0MHz versions 1.1.0. http:\/\/www.epcglobalinc.org\/standards\/uhfc1g2\/uhfc1g2_1_1_0-standard-20071017.pdf ."},{"key":"139_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID handbook","author":"K. Finkenzeller","year":"2003","unstructured":"Finkenzeller K. (2003) RFID handbook (2nd ed.). John Wiley & Sons Ltd, England","edition":"2"},{"key":"139_CR6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S. L. Garfinkel","year":"2005","unstructured":"Garfinkel S. L., Juels A., Pappu R. (2005) RFID privacy: An overview of problems and proposed solutions. Security & Privacy Magazine, IEEE 3: 34\u201343","journal-title":"Security & Privacy Magazine, IEEE"},{"key":"139_CR7","unstructured":"ISO (2004). ISO\/IEC 18000-6: Information technology\u2014radio frequency identification for item management\u2014Part 6: Parameters for air interface communications at 860\u00a0MHz to 960\u00a0MHz. http:\/\/www.iso.org ."},{"key":"139_CR8","first-page":"138","volume-title":"Yoking-proofs for RFID tags. In First international workshop on pervasive computing and communication security","author":"A. Juels","year":"2004","unstructured":"Juels A. (2004) Yoking-proofs for RFID tags. In First international workshop on pervasive computing and communication security. IEEE Press, New York, pp 138\u2013143"},{"issue":"2","key":"139_CR9","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels A. (2006) RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24(2): 381\u2013394","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"139_CR10","unstructured":"Juels, A., Pappu, R., & Parno, B. (2008). Unidirectional key distribution across time and space with applications to RFID security. In 17th USENIX security symposium (pp. 75\u201390)."},{"key":"139_CR11","doi-asserted-by":"crossref","unstructured":"Kapoor, G., Zhou, W., & Piramuthu, S. (2008). RFID and information security in supply chains. In Proceedings of international conference on mobile ad-hoc and sensor networks (MSN\u201908) (pp. 59\u201362). IEEE Press. (December, 10\u201312, 2008).","DOI":"10.1109\/MSN.2008.11"},{"key":"139_CR12","doi-asserted-by":"crossref","unstructured":"Leng, X., Lien, Y., Mayes, K., Markantonakis, K., & Chiu, J.-H. (2009). Select-response grouping proof for RFID tags. In First ACIIDS, Asian conference on intelligent information and database systems (pp. 73\u201377). IEEE Computer Society, Dong Hoi City Vietnam.","DOI":"10.1109\/ACIIDS.2009.94"},{"key":"139_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., & Ding, X. (2007). Protecting RFID communications in supply chains. InProceedings of the 2nd ACM symposium on information, computer and communications security (ASIACCS\u201907) (pp. 234\u2013241). Singapore. (March, 20\u201322, 2007).","DOI":"10.1145\/1229285.1229318"},{"key":"139_CR14","unstructured":"Lien, Y.-H., Leng, X., Mayes, K., & Chiu, J.-H. (2008). Reading order independent grouping proof for RFID tags. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics ISI 2008 (pp. 128\u2013136). (June, 2008)."},{"key":"139_CR15","doi-asserted-by":"crossref","unstructured":"Piramuthu, S. (2006). On existence proofs for multiple RFID tags. IEEE international conference on pervasive services (ICPS\u201906) (pp. 317\u2013320). (June, 2006).","DOI":"10.1109\/PERSER.2006.1652252"},{"key":"139_CR16","doi-asserted-by":"crossref","unstructured":"Saito, J., & Sakurai, K. (2005). Grouping proof for RFID tags. In Proceedings of the 19th international conference on AINA\u201905 (Vol.2, pp. 621\u2013624).","DOI":"10.1109\/AINA.2005.197"},{"key":"139_CR17","unstructured":"Sarma, S., Weis, S. A., & Engels, D. (2003). Radio-frequency identification: Risks and challenges. RSA CryptoBytes, 6(1), pp. 1\u20139. Winter Spring."},{"key":"139_CR18","unstructured":"Song, B. (2008). RFID Tag Ownership Transfer, Conference on RFID Security (RFIDSec\u201908). Budapest, Hungary July 2008. events. iaik.tugraz.at\/RFIDSec08\/Papers\/Publication\/15\u2013Song\u2014Ownership Transfer\u2014Paper.pdf. (July, 2008)."},{"key":"139_CR19","unstructured":"Van Deursen, T., & Radomirovic, S. (2008). Security of an RFID protocol for supply chains, e-Business engineering. In IEEE international conference (ICEBE \u201808) (pp. 568\u2013573). (October, 22\u201324, 2008)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-010-0139-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-010-0139-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-010-0139-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:11:57Z","timestamp":1559664717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-010-0139-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,12]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s11277-010-0139-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9,12]]}}}