{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:36:16Z","timestamp":1771515376651,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Hebei Education Department","award":["QN2015231"],"award-info":[{"award-number":["QN2015231"]}]},{"DOI":"10.13039\/501100005022","name":"Beijing Jiaotong University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005022","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research and Practice of Higher Education Teaching Reform of the Hebei Education Department","award":["2016GJJG112"],"award-info":[{"award-number":["2016GJJG112"]}]},{"name":"Doctoral Scientific Research Foundation of Shijiazhuang Tiedao University","award":["Z991015137"],"award-info":[{"award-number":["Z991015137"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2017210161"],"award-info":[{"award-number":["F2017210161"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2018210109"],"award-info":[{"award-number":["F2018210109"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2875973","type":"journal-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T02:16:08Z","timestamp":1539656168000},"page":"60996-61005","source":"Crossref","is-referenced-by-count":35,"title":["A New Mutual Authentication Protocol in Mobile RFID for Smart Campus"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9925-6836","authenticated-orcid":false,"given":"Lijuan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Chunlei","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6430-3586","authenticated-orcid":false,"given":"Ning","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jianyou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0595-z"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2365-y"},{"key":"ref31","first-page":"105","article-title":"Efficient RFID security authentication protocol that resists denial of service attacks","volume":"52","author":"shi","year":"2014","journal-title":"Comput Eng Appl"},{"key":"ref30","first-page":"612","article-title":"A mutual authentication protocol of mobile RFID based on dynamic shared-key","volume":"45","author":"wang","year":"2017","journal-title":"Acta Electronica Sinica"},{"key":"ref36","first-page":"289","article-title":"A lightweight privacy-preserving grouping proof protocol for RFID systems","volume":"43","author":"guo","year":"2015","journal-title":"Acta Electronica Sinica"},{"key":"ref35","article-title":"Application of wireless connection based on hash function of RFID security authentication protocol","author":"zheng","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63854"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","article-title":"A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems","volume":"11","author":"robin","year":"2013","journal-title":"Ad Hoc Netw"},{"key":"ref11","first-page":"79","article-title":"Design and implementation of intelligent campus security system","volume":"3","author":"wu","year":"2013","journal-title":"Internet of Things Technologies"},{"key":"ref12","first-page":"29","article-title":"Research and design of a smart cross-layer security solution for campus card","volume":"20","author":"cao","year":"2012","journal-title":"Journal of Beijing Institute of Petro-Chemical Technology"},{"key":"ref13","first-page":"163","article-title":"Intelligent campus network based on RFID and campus card","author":"zhou","year":"2014","journal-title":"Electron World"},{"key":"ref14","first-page":"37","article-title":"Discussion on the application of Internet of Things technology in intelligent campus construction","author":"zhai","year":"2016","journal-title":"Electronic Technology and Software Engineering"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/ISSNIP.2004.1417485","article-title":"Security and privacy solutions for low-cost RFID systems","author":"ranasinghe","year":"2004","journal-title":"Proc Intell Sensors Sensor Netw Inf Process Conf"},{"key":"ref16","article-title":"Study on security related to RFID technology in Internet of Things","author":"cao","year":"2013"},{"key":"ref17","article-title":"RFID system security architecture and key technology research","author":"zhang","year":"2014"},{"key":"ref18","first-page":"185","article-title":"High security identity tags using spiral resonators","volume":"52","author":"anju","year":"2016","journal-title":"Comput Mater Continua"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/TC.2012.196","article-title":"SPONGENT: The design space of lightweight cryptographic hashing","volume":"62","author":"andrey","year":"2013","journal-title":"IEEE Trans Comput"},{"key":"ref28","first-page":"68","article-title":"A lightweight RFID mutual authentication protocol with ownership transfer","author":"fu","year":"2012","journal-title":"Advances in Wireless Sensor Networks"},{"key":"ref4","first-page":"126","article-title":"Exploration of intelligent campus construction in the age of Internet+","author":"xu","year":"2016","journal-title":"Shandong Industrial Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1605-6"},{"key":"ref3","article-title":"Design and security analysis of intelligent campus card information management system","author":"guo","year":"2017"},{"key":"ref6","first-page":"68","article-title":"Application of Internet of Things technology in intelligent campus","volume":"2","author":"ma","year":"2012","journal-title":"Internet of Things Technologies"},{"key":"ref29","first-page":"657","article-title":"Mobile bidirectional authentication protocol based on Hash function","volume":"36","author":"tao","year":"2016","journal-title":"J Comput Appl"},{"key":"ref5","first-page":"24","article-title":"A fuzzy approach for an IoT-based automated employee performance appraisal","volume":"53","author":"kaur","year":"2015","journal-title":"Comput Mater Continua"},{"key":"ref8","first-page":"960","article-title":"Survey of privacy of radio frequency identification technology","volume":"26","author":"zhou","year":"2015","journal-title":"J Softw"},{"key":"ref7","first-page":"39","article-title":"Intelligent campus security inspection system based on RFID technology","author":"xu","year":"2017","journal-title":"Practical Electronics"},{"key":"ref2","first-page":"140","article-title":"Research on Key Technologies of campus security Internet of Things","author":"tang","year":"2016","journal-title":"J Modern vocational education"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-981-10-3274-5_20","article-title":"An RFID cloud authentication protocol for object tracking system in supply chain management","author":"anandhi","year":"2016","journal-title":"Digital Connectivity&#x2014;Social Impact"},{"key":"ref1","article-title":"Analysis and design of RFID security protocol in Internet of Things","author":"yuan","year":"2016"},{"key":"ref20","article-title":"A practical approach for enhancing security in mobile RFID environment","author":"sandhya","year":"2011","journal-title":"Proc Future Inf Technol &#x2013;Int Comput Sci Inf Technol (ICFIT)"},{"key":"ref22","first-page":"106","article-title":"Design and analysis of two-way authentication protocol for lightweight RFID","volume":"42","author":"zhang","year":"2013","journal-title":"J Univ Electron Sci Technol China"},{"key":"ref21","first-page":"116","article-title":"An improved two-way security authentication protocol in mobile RFI and D","author":"wang","year":"2014","journal-title":"Inf Secur Commun Secur"},{"key":"ref24","first-page":"304","article-title":"An improved ultra-lightweight RFID authentication protocol","volume":"32","author":"shen","year":"2015","journal-title":"Applied Soft Computing"},{"key":"ref23","first-page":"1350","article-title":"Design of security protocol for mobile radio frequency identification based on Hash function","volume":"33","author":"liu","year":"2013","journal-title":"J Comput Appl"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2015.7296165"},{"key":"ref25","first-page":"111","article-title":"A two-way authentication protocol for ultra-lightweight mobile radio frequency identification","volume":"44","author":"huang","year":"2017","journal-title":"Comput Sci"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08491288.pdf?arnumber=8491288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T11:14:20Z","timestamp":1720696460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2875973","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}