{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:48:49Z","timestamp":1729648129065,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675373","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T15:58:59Z","timestamp":1386172739000},"page":"359-364","source":"Crossref","is-referenced-by-count":1,"title":["A new authentication RFID protocol with ownership transfer"],"prefix":"10.1109","author":[{"family":"Yi-Qi Gui","sequence":"first","affiliation":[]},{"family":"Jie Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"2005","article-title":"Owner transferable privacy protection scheme for rfid tags","author":"saito","year":"0","journal-title":"CSS 2005 2005 of IPSJ Symposium Series"},{"key":"2","article-title":"Cryptographic approach to privacy-friendly Tags?","author":"ohkubo","year":"2003","journal-title":"RFID Privacy Workshop"},{"key":"10","first-page":"68","article-title":"Two security problems of rfid security method with ownership transfer,?","author":"eun-jun","year":"2008","journal-title":"Proc IFIP Int Conf Netw ParallelComput"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1516241.1516284"},{"key":"6","article-title":"An improved rfid security method with ownership transfer?","author":"yi-qi","year":"2011","journal-title":"Proceedings of ICTC2011"},{"key":"5","first-page":"147","article-title":"A scalable rfid authentication protocol supporting ownership transfer and controlled delegation?. Rfid security and privacy","volume":"7055","author":"fernandez-mir","year":"2012","journal-title":"LNCS"},{"key":"4","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","article-title":"Scalable rfid security protocols supporting tag ownership transfer?","volume":"34","author":"song","year":"2011","journal-title":"Elsevier Computer Communications"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.26"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2007.29"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295430"},{"key":"12","article-title":"Rfid tag ownership transfer?","author":"song","year":"2008","journal-title":"Proceedings of RFID Sec08"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"JEJU ISLAND, Korea (South)","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675373.pdf?arnumber=6675373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:39:22Z","timestamp":1498088362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675373","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}