{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:06:30Z","timestamp":1756425990932,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/coginf.2008.4639190","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T14:47:34Z","timestamp":1223390854000},"page":"366-374","source":"Crossref","is-referenced-by-count":3,"title":["Protect mobile RFID location privacy using dynamic identity"],"prefix":"10.1109","author":[{"family":"Ming Hour Yang","sequence":"first","affiliation":[{"name":"Information Computer Science, Chung Yuan Christian University, Taiwan"}]},{"family":"Jain-Shing Wu","sequence":"additional","affiliation":[{"name":"Networks and Multimedia Institute, Institute for Information Industry, Taiwan"}]},{"family":"Shih-Jen Chen","sequence":"additional","affiliation":[{"name":"Networks and Multimedia Institute, Institute for Information Industry, Taiwan"}]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63854"},{"key":"15","first-page":"1","article-title":"real time cryptanalysis of a5\/1 on a pc","author":"alex","year":"2000","journal-title":"Fast Software Encryption"},{"key":"16","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-540-24646-6_16","article-title":"tackling security and privacy issues in radio frequency identification devices","author":"henrici","year":"2004","journal-title":"International Conference on Pervasive Computing"},{"key":"13","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/ICMB.2005.2","article-title":"a feasible security mechanism for low cost rfid tags","author":"chang","year":"2005","journal-title":"Proc Int Conf Mobile Bus"},{"key":"14","first-page":"143","article-title":"chameleon hashing and signatures","author":"krawczyk","year":"2000","journal-title":"NDSS'00"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"1","article-title":"authenticating pervasive devices with human protocols","author":"juels","year":"2005","journal-title":"Cryptography"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"7","first-page":"134","article-title":"squealing euros: privacy protection in rfid-enabled banknotes","author":"juels","year":"2003","journal-title":"Financial Cryptography"},{"key":"6","article-title":"non-identifiable anonymous-id scheme for rfid privacy protection","author":"kinoshita","year":"2003","journal-title":"Computer Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2004","journal-title":"Lectures Notes in Computer Science"}],"event":{"name":"2008 7th IEEE International Conference on Cognitive Informatics (ICCI)","start":{"date-parts":[[2008,8,14]]},"location":"Stanford, CA, USA","end":{"date-parts":[[2008,8,16]]}},"container-title":["2008 7th IEEE International Conference on Cognitive Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4629860\/4639143\/04639190.pdf?arnumber=4639190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:03:30Z","timestamp":1756404210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4639190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/coginf.2008.4639190","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}