{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:06:24Z","timestamp":1729652784904,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/icics.2011.6173129","type":"proceedings-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:57:10Z","timestamp":1333634230000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["An untraceable and server-independent RFID authentication scheme"],"prefix":"10.1109","author":[{"family":"Bin Wang","sequence":"first","affiliation":[]},{"family":"Maode Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Security analysis of two ultra-lightweight rfid authentication protocols","author":"li","year":"2007","journal-title":"Proc 22nd IFIP TC-11 Int'l Information Security Conf"},{"key":"13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/1278901.1278916","article-title":"Security of ultra-lightweight rfid authentication protocols and its improvements","volume":"41","author":"chien","year":"2007","journal-title":"ACM Operating System Rev"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ARES.2007.159"},{"key":"11","article-title":"Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning","author":"duc","year":"2006","journal-title":"Proc 2006 Symp Cryptography and Information Security"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1049\/el:20052622"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/MSP.2005.78"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/MPRV.2006.17"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/MC.2008.386"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.csi.2006.04.004"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TSMCC.2010.2043949"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TWC.2008.061012"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/JSAC.2005.861395"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/JSYST.2007.909820"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SECPERU.2006.10"},{"key":"8","article-title":"Untraceability of RFID protocols","author":"ton","year":"2008","journal-title":"Information Security Theory and Practices Smart Devices Convergence and Next Generation Networks"}],"event":{"name":"2011 8th International Conference on Information, Communications & Signal Processing (ICICS 2011)","start":{"date-parts":[[2011,12,13]]},"location":"Singapore","end":{"date-parts":[[2011,12,16]]}},"container-title":["2011 8th International Conference on Information, Communications &amp; Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6165552\/6173124\/06173129.pdf?arnumber=6173129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:57:25Z","timestamp":1497963445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6173129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icics.2011.6173129","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}