{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:54:08Z","timestamp":1725778448126},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6848086","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T11:18:13Z","timestamp":1406632693000},"page":"1510-1518","source":"Crossref","is-referenced-by-count":17,"title":["COLLECTOR: A secure RFID-enabled batch recall protocol"],"prefix":"10.1109","author":[{"given":"Saiyu","family":"Qi","sequence":"first","affiliation":[]},{"given":"Yuanqing","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Mo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Li","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.276"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.06.044"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/927369"},{"key":"13","article-title":"Tracker: Security and privacy for rfid-based supply chains","author":"blass","year":"2011","journal-title":"NDSS"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1109\/EDOCW.2008.37","article-title":"Industrial privacy in rfid-based batch recalls","author":"chaves","year":"2008","journal-title":"Enterprise Distributed Object Computing Conference Workshops"},{"key":"11","article-title":"Protecting rfid communications in supply chains","author":"li","year":"2007","journal-title":"ASIACCS ACM"},{"key":"12","article-title":"Unidirectional key distribution across time and space with applications to rfid security","author":"juels","year":"2008","journal-title":"Usenix Security"},{"key":"3","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"SPC"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"7","article-title":"Randomizing rfid private authentication","author":"yao","year":"2009","journal-title":"PerCom IEEE"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.13"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062117"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491299"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","start":{"date-parts":[[2014,4,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06848086.pdf?arnumber=6848086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T05:02:14Z","timestamp":1565672534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6848086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6848086","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}