{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:04:18Z","timestamp":1725426258602},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/rfid-ta.2011.6068664","type":"proceedings-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T18:03:03Z","timestamp":1320429783000},"page":"370-375","source":"Crossref","is-referenced-by-count":3,"title":["MedAssist - A privacy preserving application using RFID tags"],"prefix":"10.1109","author":[{"given":"Sandra","family":"Dominikus","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information technology - Security techniques - Entity authentication mechanisms Part 3 Entity authentication mechanisms using a public key algorithm","year":"1993","key":"ref4"},{"key":"ref3","article-title":"An ECDSA Processor for RFID Authentication","author":"hutter","year":"2010","journal-title":"Workshop on RFID Security - RFIDsec 2010 6th Workshop"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2010.5724742"},{"key":"ref11","first-page":"207","article-title":"Scaling ECC Hardware to a Minimum","author":"wolkerstorfer","year":"2005","journal-title":"Proceedings of the Austrochip 2005"},{"key":"ref5","article-title":"Defining Strong Privacy for RFID","author":"juels","year":"2006","journal-title":"Report 20061137"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.148"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0213-4"},{"key":"ref2","article-title":"ECC is Ready for RFID - A Proof in Silicon","author":"hein","year":"2008","journal-title":"Workshop on RFID Security 2008"},{"journal-title":"White Paper The Networked Physical World","year":"2000","author":"sarma","key":"ref9"},{"key":"ref1","article-title":"A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography","author":"bock","year":"2008","journal-title":"RFIDsec 2008"}],"event":{"name":"2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","start":{"date-parts":[[2011,9,15]]},"location":"Sitges, Spain","end":{"date-parts":[[2011,9,16]]}},"container-title":["2011 IEEE International Conference on RFID-Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6058515\/6068591\/06068664.pdf?arnumber=6068664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:43:13Z","timestamp":1490096593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6068664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2011.6068664","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}