{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:17:34Z","timestamp":1739510254846,"version":"3.37.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/mobhoc.2009.5337025","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T18:45:43Z","timestamp":1259088343000},"page":"959-964","source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Synchronization Approach for RFID private authentication"],"prefix":"10.1109","author":[{"given":"Qingsong","family":"Yao","sequence":"first","affiliation":[]},{"given":"Yong","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"22"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1145\/1030083.1030112","article-title":"Privacy and Security in Library RFID: Issues, Practices, and Architectures","author":"molnar","year":"2004","journal-title":"Proceedings ofACM CCS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062117"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.67"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"14","article-title":"Minimalist Cryptography for Low-Cost RFID Tags","author":"juels","year":"2004","journal-title":"Proceedings of SCN"},{"key":"11","article-title":"Efficient Hash-Chain based RFID Privacy Protection Scheme","author":"ohkubo","year":"2004","journal-title":"Proceedings of UbiComp Workshop Privacy Current Status and Future Directions"},{"key":"12","article-title":"Reducing Time Complexity in RFID Systems","author":"avoine","year":"2005","journal-title":"Proceedings of SAC"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"key":"20","article-title":"A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags","author":"molnar","year":"2005","journal-title":"Proceedings of SAC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1242060.1242061"},{"key":"1","article-title":"an ubiquitous architectural framework and protocol for object tracking using rfid tags","author":"de","year":"2004","journal-title":"Proceedings of ACM MobiQuitous Networking Conference"},{"key":"10","article-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems","author":"weis","year":"2003","journal-title":"Proceedings of SPC"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71641-9_9"},{"year":"0","key":"6"},{"key":"5","article-title":"Cryptographic Approach to Privacy-friendly Tags","author":"ohkubo","year":"2003","journal-title":"Proceedings of RFID Privacy Workshop"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"article-title":"Cryptography in Radio Frequency Identification and Fair Exchange Protocols","year":"2005","author":"avoine","key":"8"}],"event":{"name":"2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS)","start":{"date-parts":[[2009,10,12]]},"location":"Macau, China","end":{"date-parts":[[2009,10,15]]}},"container-title":["2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5312767\/5336910\/05337025.pdf?arnumber=5337025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T11:51:58Z","timestamp":1739447518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5337025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2009.5337025","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}