{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:22:36Z","timestamp":1729671756468,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197623","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:30:23Z","timestamp":1337884223000},"page":"811-816","source":"Crossref","is-referenced-by-count":4,"title":["Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol"],"prefix":"10.1109","author":[{"given":"Farzana","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Sheikh Iqbal","family":"Ahamed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1093\/ietcom\/e88-b.3.991","article-title":"Framed Aloha for multiple RFID objects ID","volume":"e88 b","author":"zhen","year":"2005","journal-title":"IEICE transaction on communication"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.67"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-7797-6"},{"key":"15","article-title":"Low cost SHA-1 hash function architecture for RFID tags","author":"o'neill","year":"0","journal-title":"Proc of RFIDSec 08 2008"},{"key":"16","first-page":"322","article-title":"Fast and reliable estimation schemes in RFID systems","author":"kodialam","year":"0","journal-title":"Proc of MOBICOM 06 2006"},{"key":"13","first-page":"1","article-title":"ya-srap: yet another serverless rfid authentication protocol","author":"ahamed","year":"2008","journal-title":"2008 IET 4th International Conference on Intelligent Environments IET-ICIE"},{"journal-title":"EPCglobal Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960MHz","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9786-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529514"},{"key":"21","first-page":"1","author":"abraham","year":"2002","journal-title":"Inventory Management using Passive RFID Tags A Survey"},{"journal-title":"Supertag Category Protocols","year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461946"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2007.4351808"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.11.004"},{"key":"26","first-page":"210","article-title":"Privacy and security in library RFID: Issues, practices, and architectures","author":"molnar","year":"0","journal-title":"Proc of CCS 04 2004"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"RFID Security and Privacy A Research Survey","year":"2005","author":"juels","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.13"},{"key":"1","first-page":"85","article-title":"Counterfeit goods and their potential financing of international terrorism","volume":"1","author":"pollinger","year":"2008","journal-title":"Michigan Journal of Business"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767573"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.13"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"key":"9","first-page":"228","article-title":"Quantifying information leakage in tree-based hash protocols","author":"nohl","year":"0","journal-title":"Proc of ICICS 06 2006"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062117"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2012,3,19]]},"location":"Lugano, Switzerland","end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197623.pdf?arnumber=6197623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:14:36Z","timestamp":1497971676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6197623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197623","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}