{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T06:03:28Z","timestamp":1749621808870,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/hst.2016.7495548","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:39:11Z","timestamp":1466840351000},"page":"7-12","source":"Crossref","is-referenced-by-count":23,"title":["UCR: An unclonable chipless RFID tag"],"prefix":"10.1109","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]},{"given":"Mark M.","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.148"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2007.346145"},{"key":"ref13","first-page":"27","article-title":"with ultra-wideband modulation","author":"pengyuan","year":"2006","journal-title":"Proceedings of Workshop on RFID Security (RFIDsec)"},{"key":"ref14","first-page":"281","article-title":"Enhancing RFID security and privacy by physically unclonable functions","author":"ahmad-reza","year":"2010","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2017323"},{"key":"ref18","first-page":"13","article-title":"Design of fully printable planar chipless RFID transponder with 35-bit data capacity","author":"preradovic","year":"2009","journal-title":"Microwave Conference 2009 EuMC 2009 European"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2012.2195021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2008.4597299"},{"journal-title":"UPC bar code has been in use 30 years\/Once-controversial technology is now ubiquitous","article-title":"Tricia Bishop and Baltimore Sun","year":"2004","key":"ref3"},{"key":"ref6","article-title":"Encryption in QR Code Using Stegnography","volume":"3","author":"kumar sahu","year":"2013","journal-title":"IJERA InternationalJournal of Engineering Research and Applications"},{"key":"ref5","article-title":"An encryption method for QR code image based on ECA","volume":"7","author":"xiaoyang","year":"2013","journal-title":"Int J Security and Its Applications"},{"key":"ref8","article-title":"21st century management: a reference handbook","author":"wankel","year":"2007","journal-title":"Sage Publications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/OE.21.005373"},{"article-title":"FreightWatch: Cargo theft risk will rise in 2015","year":"2015","author":"kilcarr","key":"ref2"},{"journal-title":"Intellectual Property Rights Seizures Statistics Fiscal Year 2014","article-title":"U.S. Department of Homeland Security","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0005-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2010.938571"},{"journal-title":"Radio Frequency Fundamentals","year":"2014","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.1986.1133465"}],"event":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2016,5,3]]},"location":"McLean, VA, USA","end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7489989\/7495545\/07495548.pdf?arnumber=7495548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T09:03:08Z","timestamp":1475139788000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7495548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hst.2016.7495548","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}