{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:41:31Z","timestamp":1742391691390,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062117","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"1953-1961","source":"Crossref","is-referenced-by-count":47,"title":["ACTION: Breaking the Privacy Barrier for RFID Systems"],"prefix":"10.1109","author":[{"given":"L.","family":"Lu","sequence":"first","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong"}]},{"given":"J.","family":"Han","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong"}]},{"given":"R.","family":"Xiao","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong"}]},{"given":"Y.","family":"Liu","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong"}]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","article-title":"a new fault-information model for adaptive & minimal routing in 3-d meshes","volume":"57","author":"jiang","year":"2008","journal-title":"IEEE Transactions on Reliability"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/TIT.1980.1056220","article-title":"a cryptanalytic time-memory trade-off","volume":"26","author":"hellman","year":"1980","journal-title":"IEEE Transactions on Information Theory"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"13","article-title":"efficient hash-chain based rfid privacy protection scheme","author":"ohkubo","year":"2004","journal-title":"Proceedings of the Workshop on Ubicomp Privacy"},{"key":"14","article-title":"minimalist cryptography for low-cost rfid tags","author":"juels","year":"2004","journal-title":"Proc of SC"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.17"},{"key":"3","article-title":"protecting rfid communications in supply chains","author":"li","year":"2007","journal-title":"Proc of ASIACCS06"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374641"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.81"},{"key":"10","article-title":"reducing time complexity in rfid systems","author":"avoine","year":"2005","journal-title":"Proceedings of SAC"},{"key":"7","article-title":"privacy and security in library rfid: issues, practices, and architectures","author":"molnar","year":"2004","journal-title":"Proceedings of CCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"key":"5","article-title":"security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"Proc SPC"},{"key":"4","article-title":"trust context spaces: an infrastructure for pervasive security in context-aware environments","author":"robinson","year":"2003","journal-title":"Proc SPC"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.13"},{"key":"8","article-title":"a scalable, delegatable pseudonym protocol enabling owner-ship transfer of rfid tags","author":"molnar","year":"2005","journal-title":"Proceedings of SAC"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062117.pdf?arnumber=5062117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:23:15Z","timestamp":1677781395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062117","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}