{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:47:28Z","timestamp":1729651648540,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/ntms.2009.5384805","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T21:14:24Z","timestamp":1264194864000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain"],"prefix":"10.1109","author":[{"given":"Saleem","family":"Wehbe","sequence":"first","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Imad","family":"Elhajj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"620","article-title":"A lightweight mutual authentication protocol for RFID networks","author":"luo","year":"2005","journal-title":"Proceedings of the IEEE International Conference on e-Business Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77024-4_57"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2007.4429088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368352"},{"key":"ref16","first-page":"149","article-title":"Minimalist cryptography for low-cost RFID tags","author":"juels","year":"2004","journal-title":"The Fourth International Conference on Security in Communication Networks-SCN"},{"journal-title":"EPCGlobal Class 1 Gen 2 RFID Specification","year":"2008","key":"ref17"},{"key":"ref18","first-page":"675","article-title":"A feasible security mechanism for low cost RFID tags","author":"chang","year":"2005","journal-title":"Mobile Business 2005 ICMB 2005 International Conference on"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref4","first-page":"12","article-title":"sLMAP: A real lightweight mutual authentication protocol for low-cost RFID tags","author":"peris-lopez","year":"2006","journal-title":"Workshop on RFID Security"},{"key":"ref27","first-page":"164","article-title":"An approach to security and privacy of RFID system for supply chain","author":"gao","year":"2004","journal-title":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.82"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/11915034_59","article-title":"EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags","volume":"4277","author":"peris-lopez","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1007\/11833529_93","article-title":"MA 2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags","volume":"4159","author":"peris-lopez","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref8","first-page":"17","article-title":"Mutual authentication protocol for low-cost RFID","author":"yang","year":"2005","journal-title":"Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00306-6_5"},{"key":"ref2","first-page":"141","article-title":"A simple and cost-effective rfid tag-reader mutual authentication scheme","author":"konidala","year":"2007","journal-title":"Proceedings of Int'l Conference on RFID Security"},{"key":"ref9","article-title":"RFID mutual authentication scheme based on synchronized secret information","author":"lee","year":"0","journal-title":"Symposium on Cryptography and Information Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"article-title":"Trusted-HB: a low-cost version of HB secure against Man-in-The-Middle attacks","year":"0","author":"bringer","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519342"},{"key":"ref24","article-title":"Securing the Pharmaceutical Supply Chain with RFID and Publickey infrastructure (PKI) Technologies","author":"pearson","year":"2005","journal-title":"TI White Paper"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1397705.1397711"},{"key":"ref26","first-page":"234","article-title":"Protecting RFID communications in supply chains","author":"li","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2008.4618316"}],"event":{"name":"2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2009,12,20]]},"location":"Cairo, Egypt","end":{"date-parts":[[2009,12,23]]}},"container-title":["2009 3rd International Conference on New Technologies, Mobility and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5384533\/5384652\/05384805.pdf?arnumber=5384805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:59:45Z","timestamp":1497844785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5384805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ntms.2009.5384805","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}