{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:32:44Z","timestamp":1725456764066},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716498","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T19:10:46Z","timestamp":1298056246000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Mirage: Mitigating illicit inventorying in a RFID enabled retail environment"],"prefix":"10.1109","author":[{"given":"J","family":"White","sequence":"first","affiliation":[]},{"given":"N","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.435"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/11506157_16","article-title":"RFID Guardian: A battery powered mobile device for RFID privacy management","author":"rieback","year":"2005","journal-title":"Australasian Conference on Information Security and Privacy ACISP"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2007.015503"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11927587_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"},{"key":"ref4","article-title":"RFID security and privacy: A research survey","author":"juels","year":"2005","journal-title":"RSA Laboratories Manuscript"},{"journal-title":"Minimalist Cryptography for Low-Cost RFID Tags","year":"2005","author":"juels","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029181"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080805"},{"key":"ref8","article-title":"High-power proxies for enhancing RFID privacy and utility","author":"juels","year":"0","journal-title":"Privacy Enhancing Technologies Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"journal-title":"RSA Privacy and Security","year":"2005","key":"ref2"},{"journal-title":"RFID Product News Whitepaper","article-title":"EPCglobal Class 1 Gen 2 RFID Specification","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2007.907683"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","start":{"date-parts":[[2011,1,4]]},"location":"Bangalore","end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716498.pdf?arnumber=5716498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T19:57:42Z","timestamp":1497902262000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716498","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}