{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:31:26Z","timestamp":1725766286580},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/softcom.2014.7039120","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:43:41Z","timestamp":1424202221000},"page":"128-132","source":"Crossref","is-referenced-by-count":2,"title":["RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation"],"prefix":"10.1109","author":[{"given":"Raghav V.","family":"Sampangi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Srinivas","family":"Sampalli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6119932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.400"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.83"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2013.117"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","article-title":"Chaos-Based Cryptography","author":"kocarev","year":"2011","journal-title":"ser Studies in Computational Intelligence"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.43"},{"article-title":"Systematic analysis of attacks on security protocols","year":"2005","author":"hollestelle","key":"ref16"},{"key":"ref17","article-title":"Scyther User Manual, Department of Computer Science","author":"cremers","year":"0","journal-title":"Oxford University"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2010","author":"stallings","key":"ref18"},{"key":"ref4","article-title":"A rough guide to quantum chaos","author":"poulin","year":"0","journal-title":"Department of Physics and Institute for Quantum Computing University of Waterloo"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2011.0869"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"ref5","article-title":"The scyther tool","author":"cremers","year":"0","journal-title":"Department of Computer Science University of Oxford"},{"key":"ref8","first-page":"1","article-title":"Cryptographically secure pseudo-random bit generator for rfid tags","author":"peris-lopez","year":"2010","journal-title":"International Conference for Internet Technology and Secured Transactions (ICITST 2009)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684215"},{"journal-title":"RFID Essentials","year":"2006","author":"glover","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2011.5994534"}],"event":{"name":"2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2014,9,17]]},"location":"Split, Croatia","end":{"date-parts":[[2014,9,19]]}},"container-title":["2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027280\/7039053\/07039120.pdf?arnumber=7039120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:43:46Z","timestamp":1498196626000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7039120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/softcom.2014.7039120","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}