{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:57:19Z","timestamp":1729673839559,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994037","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T03:11:01Z","timestamp":1419995461000},"page":"137-142","source":"Crossref","is-referenced-by-count":2,"title":["Privacy analysis and improvements of two recent RFID authentication protocols"],"prefix":"10.1109","author":[{"given":"Karim","family":"Baghery","sequence":"first","affiliation":[]},{"given":"Behzad","family":"Abdolmaleki","sequence":"additional","affiliation":[]},{"given":"Bahareh","family":"Akhbari","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_19"},{"key":"11","first-page":"1","article-title":"Analysis and improvement of the securing rfid systems conforming to epc class 1 generation 2 standard","volume":"66","author":"mohammadali","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"12","first-page":"52","article-title":"Hmac-based rfid authentication protocol with minimal retrieval at server","author":"jung","year":"2013","journal-title":"1st Int Conf on Evolving Internet"},{"key":"3","first-page":"1738","article-title":"Hash-based rfid mutual authentication protocol","volume":"7","author":"yang","year":"2013","journal-title":"Int J Secur Its Appl"},{"key":"2","article-title":"Rfid and iot: An overview","author":"maharjan","year":"2010","journal-title":"Simula Research Labora Tory University of Oslo"},{"key":"1","article-title":"Rfid applications","author":"heyden","year":"0","journal-title":"Fibre2Fashion"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.053"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.650"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596037"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2010.5678436"},{"key":"4","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","article-title":"Scalable rfid security protocols supporting tag ownership transfer","volume":"34","author":"song","year":"2011","journal-title":"Comp Comm"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.074"},{"key":"8","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-642-25578-6_17","article-title":"Addressing flaws in rfid authentication protocols","volume":"7","author":"habibi","year":"2011","journal-title":"Progress in Cryptology INDOCRYPT 2011 LNCS 7107"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994037.pdf?arnumber=6994037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:54:39Z","timestamp":1498186479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994037","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}