{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:26:39Z","timestamp":1772907999678,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/tetc.2015.2389532","type":"journal-article","created":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T19:48:45Z","timestamp":1420832925000},"page":"134-140","source":"Crossref","is-referenced-by-count":24,"title":["DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains"],"prefix":"10.1109","volume":"5","author":[{"given":"Jun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Cong-Cong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Song","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Tracker: Security and privacy for RFID-based supply chains","author":"blass","year":"2011","journal-title":"Proc 18th Annu Netw Distrib Syst Sec Symp (NDSS '11)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185471"},{"key":"ref12","first-page":"744","article-title":"Detecting counterfeit products using supply chain event mining","author":"lee","year":"2013","journal-title":"Proc 15th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref13","year":"2014","journal-title":"EPC C1G2"},{"key":"ref14","year":"2014","journal-title":"EPC C1G2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2010.5467257"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_12"},{"key":"ref17","first-page":"1","article-title":"Tailing RFID tags for clone detection","author":"zanetti","year":"2013","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref18","author":"spivak","year":"2014","journal-title":"Category Theory for the Sciences"},{"key":"ref19","first-page":"1443","article-title":"Scenario-based simulation in production-distribution network under demand uncertainty using ARENA","author":"memari","year":"2012","journal-title":"Proc 7th Int Conf Comput Converg Technol (ICCCT)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.452-453.386"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/891584"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2009.4911190"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237395"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067041"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2012.6245962"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653668"},{"key":"ref1","first-page":"266","article-title":"Prevailing issues related to RFID implementation in the healthcare sector","author":"lefebvre","year":"2011","journal-title":"Proc 10th WSEAS Int Conf Appl Comput Appl Comput Sci (ACACOS)"},{"key":"ref9","first-page":"89","article-title":"Deckard: A system to detect change of RFID tag ownership","volume":"7","author":"mirowski","year":"2007","journal-title":"Int J Comput Sci Netw Secur"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/7869240\/07005493.pdf?arnumber=7005493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:17Z","timestamp":1633919717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7005493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2015.2389532","relation":{},"ISSN":["2168-6750"],"issn-type":[{"value":"2168-6750","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}