{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:17:33Z","timestamp":1758122253107,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/iot.2010.5678437","type":"proceedings-article","created":{"date-parts":[[2011,1,3]],"date-time":"2011-01-03T20:48:02Z","timestamp":1294087682000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Time cost evaluation for executing RFID authentication protocols"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Chiew","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tieyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Manfred","family":"Aigner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DemoTag","year":"0","key":"ref10"},{"journal-title":"ISO 18000&#x2013;6C","year":"0","key":"ref11"},{"journal-title":"EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"PRESENT: An ultra-lightweight block cipher","author":"bogdanov","year":"2007","journal-title":"Proc Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2007)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1007\/11833529_93","article-title":"M2 AP: A minimalist mutual-authentication protocol for low-cost RFID tags","author":"peris-lopez","year":"2006","journal-title":"Proceedings of the Third International Conference on Ubiquitous Intelligence and Computing (UIC06)"},{"journal-title":"CEAN RFID CAENRFIDLib Ansi C functions Library&#x2013;Technical information manual","year":"0","key":"ref15"},{"journal-title":"Rowley CrossWorks","year":"0","key":"ref16"},{"key":"ref17","first-page":"201","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"Proceedings of the First International Conference on Security in Pervasive Computing (SPC 2003)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"962","DOI":"10.1109\/TNET.2008.2002558","article-title":"Two blocking algorithms on adaptive binary splitting: Single and pair resolutions for RFID tag identification","volume":"17","author":"lai","year":"2009","journal-title":"IEEEIACM Transactions on Networking"},{"key":"ref19","article-title":"Leightweight authentication protocols for low-cost RFID tags","author":"vajda","year":"2003","journal-title":"Proceedings of the Fifth International Conference on Ubiquitous Computing (UbiComp 2003)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2008.4498295"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454918"},{"key":"ref6","first-page":"1","article-title":"Towards securing low-cost RFID systems: an unconditionally secure approach","author":"alomair","year":"2010","journal-title":"Proceedings of the 2010 Workshop on RFID Security (RFIDsec'10 Asia)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","article-title":"Strong authentication for RFID systems using the AES algorithm","author":"feldhofer","year":"2004","journal-title":"Proceedings of the Sixth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"ref7","first-page":"291","article-title":"Reducing time complexity in RFID systems","author":"avoine","year":"2005","journal-title":"Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.003"},{"journal-title":"Crypto++ Benchmarks","year":"0","key":"ref9"},{"key":"ref20","first-page":"17","article-title":"Mutual authentication protocol for low-cost RFID","author":"yang","year":"2008","journal-title":"Proceedings of the Workshop on RFID and Lightweight Crypto"},{"key":"ref22","article-title":"Maximalist cryptography and computation on the WISP UHF RFID tag","author":"chae","year":"2007","journal-title":"The Conference on RFID Security 2007 (RFIDSec 07)"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-85053-3_18","article-title":"Hash functions and RFID tags: Mind the gap","author":"bogdanov","year":"2008","journal-title":"Proc Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008)"},{"key":"ref24","first-page":"86","article-title":"The RC5 encryption algorithm","author":"rivest","year":"1994","journal-title":"Proceedings of the Second International Workshop on Fast Software Encryption (FSE94)"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/11853565_29","article-title":"A wirelessly-powered platform for sensing and computation","author":"smith","year":"2006","journal-title":"Proceedings of the Eighth International Conference on Ubiquitous Computing (Ubicomp 2006)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"ref25","article-title":"Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling","author":"ransford","year":"2008","journal-title":"The USENIX Workshop on Power Aware Computing and Systems (HotPower)"}],"event":{"name":"2010 Internet of Things (IOT)","start":{"date-parts":[[2010,11,29]]},"location":"Tokyo, Japan","end":{"date-parts":[[2010,12,1]]}},"container-title":["2010 Internet of Things (IOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5676246\/5677827\/05678437.pdf?arnumber=5678437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:57:36Z","timestamp":1497895056000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5678437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iot.2010.5678437","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}