{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:42:43Z","timestamp":1730227363261,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8125837","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T17:26:11Z","timestamp":1512408371000},"page":"179-183","source":"Crossref","is-referenced-by-count":1,"title":["Complete RFID security solution for inventory management systems"],"prefix":"10.1109","author":[{"given":"Sruthi","family":"Vattem","sequence":"first","affiliation":[]},{"given":"Tricha","family":"Anjali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"163","article-title":"Universal re-encryption for mixnets","author":"philippe","year":"2004","journal-title":"The Cryptographers Track at the RSA Conference"},{"key":"ref11","first-page":"454","article-title":"RFID systems and security and privacy implications","author":"sanjay e","year":"2002","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref12","article-title":"An RFID bill of rights","volume":"35","author":"simson","year":"2002","journal-title":"TECH NOLOGY REVIEW"},{"journal-title":"RFID Tag Data Standards 2012","year":"0","author":"traub","key":"ref13"},{"journal-title":"17 Things You Might Not Know About Gen 2 RFID Tag Memory Banks 2017","year":"0","author":"smiley","key":"ref14"},{"key":"ref4","first-page":"210","article-title":"High-power proxies for enhancing RFID privacy and utility","author":"ari","year":"2005","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref3","first-page":"149","article-title":"Minimalist cryptography for low-cost RFID tags","author":"ari","year":"2004","journal-title":"International Conference on Security in Communication Networks"},{"key":"ref6","first-page":"214","article-title":"Scanning with a purpose-supporting the fair information principles in RFID protocols","author":"christian","year":"2004","journal-title":"International Symposium on Ubiquitous Computing Systems"},{"journal-title":"Auto-ID Center (2003)","article-title":"13.56 MHz ISM Band Class 1 Radio Frequency Identification Tag Interface Specification: Candidate Recommendation, Version 1.0. 0","year":"0","key":"ref5"},{"key":"ref8","first-page":"51","article-title":"Keep on blockin'in the free world: Personal access control for low-cost RFID tags","author":"melanie r","year":"2005","journal-title":"International Workshop on Security Protocols"},{"key":"ref7","article-title":"Categorizing RFID privacy threats with STRIDE","author":"dale r","year":"2006","journal-title":"In Proceedings ACM's Symposium on Usable Privacy and Security held at CMU"},{"key":"ref2","first-page":"103","article-title":"Squealing Euros: Privacy protection in RFID-enabled banknotes","author":"ari","year":"2003","journal-title":"Computer Aided Verification"},{"key":"ref1","first-page":"103","article-title":"The blocker tag: Selective blocking of RFID tags for consumer privacy","author":"ari","year":"2003","journal-title":"Proceedings of the 10th ACM conference on Computer and communications security"},{"key":"ref9","first-page":"184","article-title":"RFID Guardian: A battery-powered mobile device for RFID privacy management","author":"melanie r","year":"2005","journal-title":"Australasian Conference on Information Security and Privacy"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08125837.pdf?arnumber=8125837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:53Z","timestamp":1516038653000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8125837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8125837","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}