{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:43:08Z","timestamp":1730288588010,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/percom.2009.4912898","type":"proceedings-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T18:19:49Z","timestamp":1242065989000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["RFID system with allowers"],"prefix":"10.1109","author":[{"given":"Przemyslaw","family":"Blaskiewicz","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Golebiewski","sequence":"additional","affiliation":[]},{"given":"Marek","family":"Klonowski","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Majcher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"298","article-title":"privacy protection for rfid's -hidden subset identifiers","volume":"5013","author":"cichon","year":"2008","journal-title":"Pervasive"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2006.61"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1050"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"journal-title":"Electronic Product Code","year":"0","key":"14"},{"key":"11","first-page":"279","article-title":"backward channel protection method for rfid security schemes based on tree-walking algorithms","volume":"4","author":"choi","year":"2006","journal-title":"JCCSA"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/345848.345865"},{"journal-title":"Lightweight authentication protocols for low-cost rfid tags","year":"2003","author":"vajda","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0213-4"},{"key":"1","article-title":"epc tag data standards version 1.3","author":"epcglobal","year":"2006","journal-title":"EPCglobal"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.23"},{"key":"7","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","article-title":"squealing euros: privacy protection in rfid enabled banknotes","author":"juels","year":"2003","journal-title":"Financial Cryptography"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1050"},{"key":"5","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"security and privacy aspects of low-cost radio frequency identification systems","volume":"2802","author":"weis","year":"2004","journal-title":"ser Lecture Notes in Computer Science"},{"key":"4","article-title":"weis","volume":"3621","author":"juels","year":"2005","journal-title":"Authenticating Pervasive Devices svith Human Protocols"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.281"},{"year":"2008","key":"8","article-title":"difrwear"}],"event":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","start":{"date-parts":[[2009,3,9]]},"location":"Galveston, TX","end":{"date-parts":[[2009,3,13]]}},"container-title":["2009 IEEE International Conference on Pervasive Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4906860\/4912739\/04912898.pdf?arnumber=4912898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T22:42:30Z","timestamp":1555368150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4912898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/percom.2009.4912898","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}