{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:52:24Z","timestamp":1725544344063},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/fskd.2012.6234312","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T23:43:25Z","timestamp":1342741405000},"page":"2111-2114","source":"Crossref","is-referenced-by-count":1,"title":["An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers"],"prefix":"10.1109","author":[{"given":"Shuang","family":"Mei","sequence":"first","affiliation":[]},{"given":"Xiao-long","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"619","article-title":"Efficient authentication for low-cost rfid systems [c]","author":"lee","year":"2005","journal-title":"Computational Science and Its Applications"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.17"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665251"},{"key":"7","first-page":"1062","article-title":"Supporting recovery, privacy and security in rfid systems using a robust authentication protocol [c]","author":"hoque","year":"2009","journal-title":"20th Annual ACM Symposium on Applied Computing"},{"key":"6","first-page":"149","article-title":"Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [c]","author":"henrici","year":"2004","journal-title":"Proc of 2nd IEEE Annual Conference on Pervasive Computing and Comm"},{"key":"5","first-page":"50","article-title":"Security and privacy aspects of low-cost radio frequency identification systems [c]","author":"weis","year":"2003","journal-title":"Proc 1st Int Conf Security Perv Comput"},{"key":"4","article-title":"Enhanced rfid mutual authentication scheme based on synchronized secret information [r]","author":"lee","year":"2006","journal-title":"Auto-ID Labs WP-HARDWARE-032"},{"key":"9","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1016\/j.comcom.2008.05.006","article-title":"A study on secure rfid mutual authentication scheme in pervasive computing environment [j]","author":"kang","year":"2008","journal-title":"Computer Communications"},{"key":"8","first-page":"1648","article-title":"An authentication protocol for secure and efficient rfid communication [c]","author":"li","year":"2010","journal-title":"Proc of 2010 International Conference on Logistics Systems and Intelligent Management"}],"event":{"name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, Sichuan, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227654\/6233707\/06234312.pdf?arnumber=6234312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:38:00Z","timestamp":1497994680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6234312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/fskd.2012.6234312","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}