{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:57:12Z","timestamp":1764997032704,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/cit.2014.80","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:55:58Z","timestamp":1419965758000},"page":"276-280","source":"Crossref","is-referenced-by-count":7,"title":["LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT"],"prefix":"10.1109","author":[{"given":"Kai","family":"Fan","sequence":"first","affiliation":[]},{"given":"Chen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63854"},{"key":"13","first-page":"164","article-title":"An approach to security and privacy of RFID system for supply chain","author":"gao","year":"2004","journal-title":"Proceedings of ECTDEB"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"journal-title":"Security and privacy in radio-frequency identification devices","year":"2003","author":"weis","key":"11"},{"key":"12","first-page":"719","article-title":"Hash-chain based forwardsecure privacy protection scheme for low-cost RFID","author":"ohkubo","year":"2004","journal-title":"Proceedings of SCIS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"2","first-page":"103","article-title":"Squealing euros: Privacy protection in RFIDenabled banknotes","volume":"2742","author":"juels","year":"2003","journal-title":"FC"},{"journal-title":"RFID Major Projects and the State Internet of Things","year":"2008","author":"ning","key":"1"},{"key":"10","first-page":"454","article-title":"RFID systems and security and privacy implications","author":"sarma","year":"2003","journal-title":"Proceedings of CHES"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.226"},{"key":"6","first-page":"1241","article-title":"An identity-based authenticated key agreement protocol without bilinear pairing","volume":"31","author":"cao","year":"2009","journal-title":"Journal of electronics and information technology"},{"key":"5","first-page":"201","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","volume":"2802","author":"weis","year":"2004","journal-title":"Proceedings of SPC"},{"journal-title":"Cryptographic Approach to Privacy-friendly Tags","year":"2003","author":"ohkubo","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2253892"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700203"}],"event":{"name":"2014 IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2014,9,11]]},"location":"Xi'an, China","end":{"date-parts":[[2014,9,13]]}},"container-title":["2014 IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6973087\/6984594\/06984666.pdf?arnumber=6984666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:48:04Z","timestamp":1490316484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6984666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cit.2014.80","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}