{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:49:04Z","timestamp":1729626544413,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/rfid.2016.7488022","type":"proceedings-article","created":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T21:33:36Z","timestamp":1465508016000},"page":"1-14","source":"Crossref","is-referenced-by-count":9,"title":["Two rounds RFID grouping-proof protocol"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Abughazalah","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2006.1652252"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-009-9373-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.04.008"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-85893-5_13","article-title":"Provably secure grouping-proofs for RFID tags","author":"burmester","year":"2008","journal-title":"Smart Card Research and Advanced Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.212"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389829"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16363-5_10"},{"key":"ref17","first-page":"453","article-title":"Secret disclosure attack on Kazahaya, a yoking-proof for low-cost RFID tags","volume":"2013","author":"bagheri","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","article-title":"The Scyther tool: Verification, falsification, and analysis of security protocols","author":"cremers","year":"2008","journal-title":"Computer Aided Verification"},{"journal-title":"Scyther Unbounded Verification of Security Protocols","year":"2007","author":"cremers","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2010.5678437"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2006.340395"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2014.6934242"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2011.5764620"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316338"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-1990-6"},{"year":"2008","key":"ref2","article-title":"EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.197"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","author":"finkenzeller","year":"2003","journal-title":"RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification"},{"key":"ref20","first-page":"1","article-title":"formal verification of ieee 802.16 security sublayer using scyther tool","author":"taha","year":"2009","journal-title":"2009 International Conference on Network and Service Security n2s"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019737"},{"key":"ref21","first-page":"336","article-title":"New attacks on ISO key establishment protocols","volume":"2008","author":"mathuria","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"Scyther Script","year":"0","author":"abughazalah","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"journal-title":"R12601 - Slate","year":"0","key":"ref26"},{"key":"ref25","article-title":"Secure semi-passive RFID tags-prototype and analysis","author":"aigner","year":"2008","journal-title":"B Tech Project Report"}],"event":{"name":"2016 IEEE International Conference on RFID (RFID)","start":{"date-parts":[[2016,5,3]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Conference on RFID (RFID)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7483866\/7487991\/07488022.pdf?arnumber=7488022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:36:59Z","timestamp":1718631419000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7488022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/rfid.2016.7488022","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}