{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:34:57Z","timestamp":1729636497255,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/rfid-ta.2011.6068660","type":"proceedings-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T18:03:03Z","timestamp":1320429783000},"page":"348-352","source":"Crossref","is-referenced-by-count":0,"title":["Backward Link Authentication For RFID tags"],"prefix":"10.1109","author":[{"given":"Behzad","family":"Malek","sequence":"first","affiliation":[]},{"given":"Ali","family":"Miri","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Orozco-Barbosa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0224-0"},{"key":"ref11","first-page":"122","article-title":"NTRUSign: Digital signatures using the NTRU lattice","volume":"2612","author":"hoffstein","year":"2003","journal-title":"Topics in Cryptology &#x2013; The Cryptographers' Track at the RSA Conferenc"},{"key":"ref12","article-title":"NTRU report 012. Estimated breaking times for NTRU lattices","author":"hoffstein","year":"2003","journal-title":"Technical Report 12 NTRU Cryptosystems Inc"},{"key":"ref13","first-page":"198","article-title":"Authenticating pervasive devices with human protocols","volume":"3126","author":"juels","year":"2005","journal-title":"Advances in Cryptology (Crypto'05) Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.12.004"},{"journal-title":"Technical Characteristics of RFID","year":"2010","key":"ref15"},{"key":"ref16","article-title":"A public-key cryptosystem based on algebraic coding theory: DNS Progress Report","author":"j mceliece","year":"1978","journal-title":"Technical Report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9175-9"},{"key":"ref18","first-page":"352","article-title":"EMAP: An efficient mutual authentication protocolfor low-cost RFID tags","volume":"4277","author":"peris-lopez","year":"2006","journal-title":"OTM Workshops on the Move to Meaningful Internet Systems"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-642-00306-6_5","article-title":"Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol","volume":"5379","author":"peris-lopez","year":"2009","journal-title":"International Workshop Information Security Applications WISA'08"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49649-1_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.651067"},{"journal-title":"Class-1 Generation-Z UHF air interface protocol standard","year":"2010","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_21"},{"key":"ref7","first-page":"191","article-title":"Lightweight code-based authentication and signature","author":"gaborit","year":"2007","journal-title":"IEEE International Symposium on Information Theory (ISIT)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-540-88403-3_3","article-title":"Attacking and Defending the McEliece Cryptosystem","volume":"5299","author":"j bernstein","year":"2008","journal-title":"2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08)"},{"key":"ref1","first-page":"77","article-title":"Reducing Key Length of the McEliece Cryptosystem","volume":"5580","author":"p berger","year":"2009","journal-title":"Advances in Cryptology (AFRICACRYPT'09)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/el:20052622"}],"event":{"name":"2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","start":{"date-parts":[[2011,9,15]]},"location":"Sitges, Spain","end":{"date-parts":[[2011,9,16]]}},"container-title":["2011 IEEE International Conference on RFID-Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6058515\/6068591\/06068660.pdf?arnumber=6068660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T23:20:24Z","timestamp":1560900024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6068660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2011.6068660","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}