{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T04:38:00Z","timestamp":1768279080120,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5461944","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T20:54:40Z","timestamp":1273697680000},"page":"1-9","source":"Crossref","is-referenced-by-count":132,"title":["Counting RFID Tags Efficiently and Anonymously"],"prefix":"10.1109","author":[{"given":"Hao","family":"Han","sequence":"first","affiliation":[]},{"given":"Bo","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Chiu C.","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weizhen","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Sanglu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"RFID security and privacy: A research survey","author":"juels","year":"2005","journal-title":"RSA Laboratories"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/1161089.1161126","article-title":"Fast and reliable estimation schemes in RFID systems","author":"kodialam","year":"2006","journal-title":"Mobicom"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.145"},{"key":"ref14","article-title":"Counting distinct elements in a data stream","author":"bar-yossef","year":"2002","journal-title":"RANDOM"},{"key":"ref15","first-page":"702","article-title":"An anti-collision algorithm using two-functioned estimation for RFID tags","author":"zhai","year":"2005","journal-title":"ICCSA"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132928"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/3-540-45866-2_9","article-title":"Efficient object identification with passive RFID tags","author":"vogt","year":"2002","journal-title":"Pervasive"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/345848.345865","article-title":"Efficient memoryless protocol for tag identification","author":"law","year":"2000","journal-title":"DIAL-M"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1998.708695"},{"key":"ref28","article-title":"EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 mhz &#x2013; 960 mhz version 1.1.0","year":"2005","journal-title":"EPCglobal Tech Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378621"},{"key":"ref27","article-title":"Handbook of mathematical functions with Formulas, Graphs, and Mathematical Tables","author":"abramowitz","year":"1972"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376648"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.67"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378629"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374641"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.147"},{"key":"ref9","year":"0","journal-title":"Rfid Driver's Licenses Debated"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192765"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/1013235.1013321","article-title":"Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID Systems","author":"feng zhou","year":"2004","journal-title":"Proceedings of the 2004 International Symposium on Low Power Electronics and Design LPE"},{"key":"ref22","first-page":"63","article-title":"Novel anti-collision algorithms for fast object identification in RFID system","author":"cha","year":"2005","journal-title":"ICPADS (2)"},{"key":"ref21","article-title":"The Aloha system - another alternative for computer communications","author":"abramson","year":"1970","journal-title":"AFIPS Conference"},{"key":"ref24","first-page":"166","article-title":"An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification","author":"lee","year":"2005","journal-title":"MobiQuitous"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1093\/ietcom\/e88-b.3.991","article-title":"Framed ALOHA for multiple rfid objects identification","author":"zhen","year":"2005","journal-title":"IEICE Transactions"},{"key":"ref26","article-title":"Understanding Probability: Chance Rules in Everyday Life","author":"tijims","year":"2007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.77"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","location":"San Diego, CA, USA","start":{"date-parts":[[2010,3,14]]},"end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05461944.pdf?arnumber=5461944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:53:50Z","timestamp":1740084830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5461944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5461944","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}