{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T10:41:19Z","timestamp":1722940879592},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/icm.2018.8704087","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:49:41Z","timestamp":1556837381000},"source":"Crossref","is-referenced-by-count":3,"title":["IoT-Based Online Access Control System for Vehicles in Truck-Loading Fuels Terminals"],"prefix":"10.1109","author":[{"given":"Moatz M.","family":"Bahgat","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hania H.","family":"Farag","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bassem","family":"Mokhtar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","author":"finkenzeller","year":"2003","journal-title":"RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification"},{"key":"ref11","article-title":"Guidance for Securing Radio Frequency Identification (RFID) Systems","year":"2007"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-48399-1","article-title":"Fundamentals of Relational Database Management Systems","author":"sumathi","year":"2007"},{"key":"ref13","author":"mcewen","year":"2013","journal-title":"Designing the Internet of Things"},{"key":"ref14","article-title":"Practical Electrical Network Automation and Communication Systems","author":"strauss","year":"2003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2016.7847915"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47545-5"},{"key":"ref3","author":"stallings","year":"2004","journal-title":"Data and Computer Communications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10277.001.0001"},{"key":"ref5","article-title":"Wireless Security: Know it all","author":"arms","year":"2009"},{"key":"ref8","article-title":"Distributed and Cloud Computing: From Parallel Processing to the Internet of Things","author":"hwang","year":"2012"},{"key":"ref7","author":"slama","year":"2015","journal-title":"Enterprise IoT Strategies and Best Practices for Connected Products and Services"},{"key":"ref2","article-title":"Practical Industrial Data Communications: Best Practice Techniques","author":"reynders","year":"2004"},{"key":"ref1","article-title":"Industrial Communication Technology Handbook","author":"zurawski","year":"2014"},{"key":"ref9","article-title":"From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence","author":"holler","year":"2014"}],"event":{"name":"2018 30th International Conference on Microelectronics (ICM)","location":"Sousse, Tunisia","start":{"date-parts":[[2018,12,16]]},"end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 30th International Conference on Microelectronics (ICM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8698775\/8703878\/08704087.pdf?arnumber=8704087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T07:30:51Z","timestamp":1694849451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8704087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icm.2018.8704087","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}