{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:00:25Z","timestamp":1725519625353},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/idt.2013.6727091","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T18:35:43Z","timestamp":1391193343000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Assertion based on-line fault detection applied on UHF RFID tag"],"prefix":"10.1109","author":[{"given":"Ibrahim","family":"Mezzah","sequence":"first","affiliation":[]},{"given":"Omar","family":"Kermia","sequence":"additional","affiliation":[]},{"given":"Hamimi","family":"Chemali","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Abdelmalek","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Beroulle","sequence":"additional","affiliation":[]},{"given":"David","family":"Hely","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/TEST.2003.1270833"},{"year":"0","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/92.820766"},{"key":"15","first-page":"1246","article-title":"Proven correct monitors from pSL specifications","author":"katell","year":"2006","journal-title":"DATE"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ISQED.2008.4479731"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/IOLTS.2006.37"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ICCD.2005.66"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISQED.2007.38"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICM.2006.373264"},{"key":"3","first-page":"320","article-title":"Power and em attacks on passive 13.56mhz rfid devices","author":"hutter","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"2","first-page":"363","article-title":"RFID and its vulnerability to faults","author":"hutter","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/IS3C.2012.163"},{"year":"0","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ISCAIE.2012.6482108"},{"key":"6","article-title":"Sensor-enabled rFID tag handbook","author":"ruhanen","year":"2008","journal-title":"BRIDGE IST-2005-033546"},{"key":"5","first-page":"1","article-title":"Online monitoring and diagnosis of rFID readers and tags","author":"kheddam","year":"2012","journal-title":"20th International Conference on Software Telecommunications and Computer Networks"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/s10836-010-5191-6"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICCD.2005.66"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ASICON.2009.5351246"}],"event":{"name":"2013 Design and Test Symposium (IDT)","start":{"date-parts":[[2013,12,16]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2013,12,18]]}},"container-title":["2013 8th IEEE Design and Test Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6717187\/6727071\/06727091.pdf?arnumber=6727091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:08:21Z","timestamp":1490206101000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6727091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/idt.2013.6727091","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}