{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:45:16Z","timestamp":1729619116528,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/rfid-ta.2011.6068669","type":"proceedings-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T18:03:03Z","timestamp":1320429783000},"page":"402-407","source":"Crossref","is-referenced-by-count":3,"title":["Security implementation within GEN2 protocol"],"prefix":"10.1109","author":[{"given":"Sai","family":"Seshabhattar","sequence":"first","affiliation":[]},{"given":"Shesh Kumar","family":"Jagannatha","sequence":"additional","affiliation":[]},{"given":"Daniel W.","family":"Engels","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"EPC Radio Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz","year":"0","author":"inc","key":"ref10"},{"key":"ref11","article-title":"Information Society Technologies","author":"feldhofer","year":"2005","journal-title":"State of the Art in Hardware Architectures"},{"key":"ref12","article-title":"197: Advanced Encryption Standard (AES)","author":"pub","year":"2001","journal-title":"Federal Information Processing Standards Publication US Department of Commerce"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286716"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"PRESENT: An ultra-lightweight block cipher","volume":"4727","author":"bogdanov","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378273"},{"key":"ref16","first-page":"89","article-title":"Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents","author":"rolfes","year":"0","journal-title":"Smart Card Research and Advanced Applications"},{"journal-title":"Efficient Tiny Hardware Cipher under Verilog","year":"0","author":"damaj","key":"ref17"},{"key":"ref18","first-page":"2009","article-title":"Ultra-Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol","author":"engels","year":"2009","journal-title":"Centre for Applied Cryptographic Research (CACR) Technical Reports"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","article-title":"Squealing Euros: Privacy protection in RFID-enabled banknotes","author":"juels","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","article-title":"Strong authentication for RFID systems using the AES algorithm","author":"feldhofer","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","article-title":"Universal reencryption for mixnets","author":"golle","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378271"},{"key":"ref7","article-title":"Secure symmetric authentication for RFID tags","author":"aigner","year":"2005","journal-title":"Telecommunication and Mobile Computing TCMC2005 Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","article-title":"RFID systems and security and privacy implications","author":"sarma","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2006.03.006"}],"event":{"name":"2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","start":{"date-parts":[[2011,9,15]]},"location":"Sitges, Spain","end":{"date-parts":[[2011,9,16]]}},"container-title":["2011 IEEE International Conference on RFID-Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6058515\/6068591\/06068669.pdf?arnumber=6068669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T05:11:19Z","timestamp":1497935479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6068669\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2011.6068669","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}