{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:32Z","timestamp":1759072112444,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/rfid-ta.2011.6068650","type":"proceedings-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T18:03:03Z","timestamp":1320429783000},"page":"279-285","source":"Crossref","is-referenced-by-count":5,"title":["Scalable trajectory-based protocol for RFID tags identification"],"prefix":"10.1109","author":[{"given":"Rolando","family":"Trujillo-Rasua","sequence":"first","affiliation":[]},{"given":"Agusti","family":"Solanas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1461464.1461467"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00207540903564934"},{"key":"ref13","first-page":"1182","article-title":"Integrating automatic data acquisition with business processes experiences with sap's auto-id infrastructure","author":"bomhovd","year":"2004","journal-title":"Proceedings of the Thirtieth International Conference on Very Large Data Bases- Volume 30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2006.47"},{"journal-title":"Architectural Considerations for Distributed Rfid Tracking and Monitoring","year":"0","author":"cao","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2007.4351808"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"ref6","article-title":"Adversary Model for Radio Frequency Identification","author":"avoine","year":"2005","journal-title":"Technical Report LASEC-REPORT-2005&#x2013;001"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/PERCOMW.2004.1276922","article-title":"Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers","author":"henrici","year":"2004","journal-title":"Pervasive Computing and Communications Workshops 2004 Proceedings of the Second IEEE Annual Conference on"},{"key":"ref8","first-page":"201","author":"weis","year":"2003","journal-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems"},{"key":"ref7","first-page":"291","article-title":"Reducing Time Complexity in RFID Systems","volume":"3897","author":"avoine","year":"2005","journal-title":"Selected Areas in Cryptography-SAC 2005 LNCS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.08.006"}],"event":{"name":"2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","start":{"date-parts":[[2011,9,15]]},"location":"Sitges, Spain","end":{"date-parts":[[2011,9,16]]}},"container-title":["2011 IEEE International Conference on RFID-Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6058515\/6068591\/06068650.pdf?arnumber=6068650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T05:11:20Z","timestamp":1497935480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6068650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2011.6068650","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}