{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:25:30Z","timestamp":1725470730560},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/ssic.2016.7571807","type":"proceedings-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T21:19:12Z","timestamp":1474579152000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of RAIN RFID authentication schemes"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Shahrafidz Khalid","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Conchon","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Peyrard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"ISO\/IEC CD 29167&#x2013;14 Information technology Automatic identification and data capture techniques Part 14: Air interface for security services crypto suite AES OFB"},{"year":"0","key":"ref11","article-title":"ISO\/IEC DIS 29167&#x2013;16 Information technology Automatic identification and data capture techniques Part 16: Air interface for security services crypto suite ECDSA-ECDH"},{"year":"0","key":"ref12","article-title":"ISO\/IEC DIS 29167&#x2013;19 Information technology Automatic identification and data capture techniques Part 16: Air interface for security services crypto suite RAMON"},{"year":"0","key":"ref13","article-title":"LoRa Alliance"},{"year":"0","key":"ref14","article-title":"OMNeT++, Discrete Event Simulator"},{"year":"2013","key":"ref15","article-title":"EPC TM Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2010.245"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.05.015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45866-2_9"},{"year":"0","key":"ref4","article-title":"ISO\/IEC CD 29167-15 information technology automatic identification and data capture techniques part 15: Air interface for security services crypto suite xor"},{"year":"0","key":"ref3","article-title":"ISO\/IEC FDIS 29167-1:2013(e) information technology automatic identification and data capture techniques part 1: Security services for RFID air interfaces"},{"year":"0","key":"ref6","article-title":"ISO\/IEC FDIS 29167&#x2013;11:2014(e) Information technology Automatic identification and data capture techniques Part 11: Air interface for security services crypto suite PRESENT-80"},{"year":"0","key":"ref5","article-title":"ISO\/IEC FDIS 29167&#x2013;10:2014(e) Information technology Automatic identification and data capture techniques Part 10: Crypto suite AES-128 security services for air interface communications"},{"year":"0","key":"ref8","article-title":"ISO\/IEC FDIS 29167&#x2013;12:2014(e) Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH for air interface communications"},{"year":"2011","key":"ref7","article-title":"ISO\/IEC 29167&#x2013;17 Information technology Automatic identification and data capture techniques - Part 17: Crypto suite cryptogps security services for air interface communications"},{"year":"0","key":"ref2","article-title":"ISO\/IEC 18000-63 Information technology - Radio frequency identification for item management - Part 63: Parameters for air interface communications at 860 MHz to 960 MHz type C"},{"year":"0","key":"ref1","article-title":"RAIN RFID"},{"year":"0","key":"ref9","article-title":"ISO\/IEC FDIS 29167&#x2013;13 Information technology Automatic identification and data capture techniques Part 13: Air interface for security services crypto suite grain-128A"},{"year":"0","key":"ref20","article-title":"ISO\/IEC 18033&#x2013;3 Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers"},{"year":"0","key":"ref22","article-title":"ISO\/IEC 29192&#x2013;2 Information technology - Security techniques - lightweight cryptography - Part 2: Block ciphers"},{"first-page":"450","year":"0","author":"bogdanov","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2015.7338634"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2013.6663782"}],"event":{"name":"2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2016,7,18]]},"location":"Paris, France","end":{"date-parts":[[2016,7,19]]}},"container-title":["2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7565236\/7571793\/07571807.pdf?arnumber=7571807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T02:56:53Z","timestamp":1476241013000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7571807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ssic.2016.7571807","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}