{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:00:55Z","timestamp":1774929655771,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/percomw.2004.1276920","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"138-143","source":"Crossref","is-referenced-by-count":148,"title":["\"Yoking-proofs\" for RFID tags"],"prefix":"10.1109","author":[{"given":"A.","family":"Juels","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Benetton to track clothing with ID chips","author":"shim","year":"2003","journal-title":"CNET"},{"key":"22","year":"2003","journal-title":"Texas Instruments Digital Signature Transponder Data Sheet"},{"key":"17","article-title":"Radio-frequency-identification security risks and challenges","volume":"6","author":"sarma","year":"2003","journal-title":"CryptoBytes"},{"key":"23","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"First International Conference on Security in Pervasive Computing"},{"key":"18","article-title":"Towards the five-cent tag","author":"sarma","year":"2001","journal-title":"Technical Report"},{"key":"24","author":"weis","year":"2003","journal-title":"Radio-frequency identification security and privacy"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECH.2007.4280075"},{"key":"16","article-title":"RFID systems, security and privacy implications","author":"sarma","year":"2002","journal-title":"Technical Report"},{"key":"13","year":"2003","journal-title":"U S Military to Issue RFID Mandate"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/40.977758"},{"key":"11","article-title":"RFID tags: Big brother in small packages","author":"mccullagh","year":"2003","journal-title":"CNET"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/40.977757"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.212302"},{"key":"20","article-title":"On formal models for secure key exchange (version 4)","volume":"rz 3120","author":"shoup","year":"1999","journal-title":"Revision of IBM Research Report"},{"key":"2","article-title":"The electronic product code (EPC): A naming scheme for objects","author":"brock","year":"2001","journal-title":"Technical Report"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"10","article-title":"Constructing digital signatures from a one way function","volume":"csl 98","author":"lamport","year":"1979","journal-title":"Technical Report"},{"key":"7","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","article-title":"Squealing euros: Privacy protection in RFID-enabled banknotes","author":"juels","year":"2003","journal-title":"Financial Cryptography-FC 03"},{"key":"6","article-title":"HMAC: Keyed-hashing for message authentication","volume":"2104","author":"krawczyk","year":"1997","journal-title":"Internet Engineering Task Force RFC"},{"key":"5","article-title":"Universal re-encryption for mixnets","author":"golle","year":"2004","journal-title":"CT-RSA'04"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"9","article-title":"860 MHz-960 Mhz class 1 radio frequency identification tag radio frequency and logical communication interface specification recommended standard, version 1.0.0","year":"2002","journal-title":"Technical Report"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"}],"event":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Second","location":"Orlando, FL, USA"},"container-title":["IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8997\/28557\/01276920.pdf?arnumber=1276920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:56:24Z","timestamp":1497599784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/percomw.2004.1276920","relation":{},"subject":[]}}