{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:37:56Z","timestamp":1725410276312},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/iti.2008.4588475","type":"proceedings-article","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T14:40:51Z","timestamp":1218552051000},"page":"583-588","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight RFID authentication protocol: An experimental study"],"prefix":"10.1109","author":[{"given":"Brandon","family":"Belcher","sequence":"first","affiliation":[]},{"given":"Mostafa","family":"El-Said","sequence":"additional","affiliation":[]},{"given":"George","family":"Nezlek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Feasible Security Mechanism for Low Cost RFID Tags ICMB '05 Proceedings of the International Conference on Mobile Business","year":"2005","author":"gwo-ching chang","key":"3"},{"key":"2","article-title":"breno de medeiros","author":"ateniese","year":"2005","journal-title":"Untraceable RFID Tags via Insubvertible Encryption CCS '05 Proceedings of the 12th ACM conference on Computer and communications security"},{"journal-title":"Strengthening EPC Tags Against Cloning WiSe '05 Proceedings of the 4th ACM workshop on Wireless security","year":"2005","author":"juels","key":"1"},{"year":"0","key":"7"},{"journal-title":"Elgar Fleisch Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting SAC '05 Proceedings of the 2005 ACM symposium on Applied computing","year":"2005","author":"staake","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"year":"0","key":"4"}],"event":{"name":"2008 30th International Conference on Information Technology Interfaces (ITI)","start":{"date-parts":[[2008,6,23]]},"location":"Cavtat\/Dubrovnik, Croatia","end":{"date-parts":[[2008,6,26]]}},"container-title":["ITI 2008 - 30th International Conference on Information Technology Interfaces"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4578606\/4588363\/04588475.pdf?arnumber=4588475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T18:36:46Z","timestamp":1489689406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4588475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/iti.2008.4588475","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}