{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T10:04:00Z","timestamp":1747649040193,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/rfid-ta.2013.6694532","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T17:06:51Z","timestamp":1389028011000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Attack and defense mechanisms of malicious EPC event injection in EPC discovery service"],"prefix":"10.1109","author":[{"family":"Su Mon Kywe","sequence":"first","affiliation":[]},{"family":"Yingjiu Li","sequence":"additional","affiliation":[]},{"family":"Jie Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78731-0_3"},{"key":"17","first-page":"19","article-title":"Discovery service design in the EPCglobal network: Towards full supply chain visibility","volume":"4952 lncs","author":"kurschner","year":"2008","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2012.22005"},{"key":"15","article-title":"Tailing RHD tags for clone detection","author":"zanetti","year":"2013","journal-title":"Proc of the Network and Distributed System Security Symposium (NDSS)"},{"key":"16","first-page":"214","article-title":"Discovery servicesenabling RFID traceability in EPCglobal networks","author":"beier","year":"2006","journal-title":"COMAD"},{"key":"13","first-page":"357","author":"feldhofer","year":"2004","journal-title":"Strong Authentication for RFID Systems using the AES Algorithm"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653670"},{"key":"11","first-page":"6","article-title":"A compact SHA-256 architecture for rfid tags","author":"cao","year":"2011","journal-title":"22nd IET Irish Signals and Systems Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271509"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.08.005"},{"key":"20","article-title":"Design and implementation of a secure prototype for EPCglobal network services","author":"shi","year":"2012","journal-title":"The 2012 Workshop on RFID and IoT Security (RFIDsec Asia)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166783"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.351"},{"key":"24","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-540-85379-4_22","article-title":"Proof of possession: Using RHD for large-scale authorization management","volume":"11","author":"grummt","year":"2007","journal-title":"Am Workshops Ser Communications in Computer and Information Science"},{"key":"25","first-page":"276","article-title":"A scalable, delegatable pseudonym. Protocol enabling ownership transfer of RFID tags (Extended Abstract)","volume":"3897 lncs","author":"molnar","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"26","first-page":"291","article-title":"Securing RHD systems by detecting tag cloning","author":"lehtonen","year":"2009","journal-title":"Proceedings of the 7th International Conference on Pervasive Computing Ser Pervasive '09"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2010.5467257"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133634"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.47"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_12"},{"journal-title":"EPC-global","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067041"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809873"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.23"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2010.5529853"},{"key":"9","article-title":"Probabilistic approach for location-based authentication","author":"lehtonen","year":"2007","journal-title":"The 1st International Workshop on Security for Spontaneous Interaction (IWSSl)"},{"key":"8","article-title":"Deckard: A system to detect change of RHD tag ownership","volume":"7","author":"mirowski","year":"2007","journal-title":"International Journal of Computer Science and Network Security"}],"event":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2013)","start":{"date-parts":[[2013,9,4]]},"location":"Johor Bahru","end":{"date-parts":[[2013,9,5]]}},"container-title":["2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6683939\/6694496\/06694532.pdf?arnumber=6694532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:23:00Z","timestamp":1498108980000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6694532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2013.6694532","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}