{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:29:44Z","timestamp":1729672184272,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/rfid.2016.7488020","type":"proceedings-article","created":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T21:33:36Z","timestamp":1465508016000},"page":"1-7","source":"Crossref","is-referenced-by-count":17,"title":["An anonymous RFID grouping-proof with missing tag identification"],"prefix":"10.1109","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Munilla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/PERSER.2006.1652252"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-540-85893-5_13"},{"key":"ref12","article-title":"A rfid grouping proof protocol for medication safety of inpatient","author":"huang","year":"2008","journal-title":"Journal of Medical Systems"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1136\/bmj.a3160","article-title":"Two rfid-based solutions to enhance inpatient medication safety","author":"chien","year":"2009","journal-title":"Journal of Medical Systems"},{"key":"ref14","first-page":"779","article-title":"Distributed group authentication for rfid supply management","volume":"2013","author":"burmester","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/RFID.2012.6193063"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.1962.1057683"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/LCOMM.2013.051313.130068"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TCOMM.2015.2472402"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TCOMM.2013.101113.130216"},{"key":"ref28","article-title":"Discance Bounding Protocols with Void-Challenges for RFID","author":"munilla","year":"2006","journal-title":"Workshop on RFID Security -RFIDSec 06"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TPDS.2012.218"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-642-00730-9_7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11277-013-1011-5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.jnca.2010.04.008"},{"key":"ref29","first-page":"528","article-title":"On the security of RFID group scanning protocols","volume":"93 d","author":"duc","year":"2010","journal-title":"IEICE Transactions"},{"key":"ref5","article-title":"Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID","author":"burmester","year":"2013","journal-title":"IGI Global"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/AINA.2005.197"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/PERCOMW.2004.1276920"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TSMCC.2010.2091501"},{"key":"ref9","article-title":"Generalized &#x201C;yoking-proofs&#x201D; for a group of RFID tags","author":"juels","year":"2006","journal-title":"Mobiquitous 2006"},{"year":"2015","journal-title":"Tech Rep","article-title":"Radio-Frequency Identity Protocols, Generation-2.V2. UHF RFID","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/LSP.2014.2306264"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1002\/9780470016152"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/RFID.2015.7113082"},{"key":"ref24","article-title":"Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME","author":"roca","year":"2013","journal-title":"Tech Rep"},{"year":"0","article-title":"ISO\/IEC 29192&#x2013;1: Information Technology-Security Techniques - Lightweight cryptography - Part 1: General. ISO\/IEC, 2012","key":"ref23"},{"year":"2007","author":"mangard","journal-title":"Power Analysis Attacks - Revealing the Secrets of Smart Cards","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/BF00196726"}],"event":{"name":"2016 IEEE International Conference on RFID (RFID)","start":{"date-parts":[[2016,5,3]]},"location":"Orlando, FL","end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Conference on RFID (RFID)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7483866\/7487991\/07488020.pdf?arnumber=7488020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:37:12Z","timestamp":1718631432000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7488020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/rfid.2016.7488020","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}