{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:56:45Z","timestamp":1729630605915,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/wowmom.2012.6263773","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T16:06:16Z","timestamp":1345133176000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["PPS: Privacy-preserving statistics using RFID tags"],"prefix":"10.1109","author":[{"given":"Erik-Oliver","family":"Blass","sequence":"first","affiliation":[]},{"given":"Kaoutar","family":"Elkhiyaoui","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"117","article-title":"On the security of elgamal based encryption","volume":"1431","author":"yiannis","year":"1998","journal-title":"LNCS"},{"key":"22","first-page":"201","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"weis","year":"2003","journal-title":"Security in Pervasive Computing"},{"key":"17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-540-74835-9_13","article-title":"Information confinement, privacy, and security in RFID systems","volume":"4734","author":"di pietro","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"18","article-title":"Anonymizer-Enabled Security and Privacy for RFID","author":"sadeghi","year":"0","journal-title":"8th International Conference on Cryptology and Network Security Kanazawa Japan December 2009"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741884"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"14","first-page":"103","article-title":"Squealing euros: Privacy protection in rfid-enabled banknotes","author":"juels","year":"2002","journal-title":"Financial Cryptography-FC 03"},{"key":"11","first-page":"163","article-title":"Universal reencryption for mixnets","author":"golle","year":"2004","journal-title":"RSA Conference Cryptographer's Track"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461944"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11207-2_14"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.37"},{"key":"1","first-page":"92","article-title":"Untraceable rfid tags via insubvertible encryption","author":"ateniese","year":"2005","journal-title":"12th ACM conference on Computer and communications security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01700692"},{"journal-title":"Secure anonymous RFID authentication protocols","year":"2006","author":"chatmon","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455814"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.10"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928290"},{"key":"9","first-page":"10","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"el gamal","year":"1985","journal-title":"Advances in Cryptology Proc of CRYPTO 84"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460921"}],"event":{"name":"2012 IEEE Thirteenth International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2012,6,25]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253016\/6263669\/06263773.pdf?arnumber=6263773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:56:37Z","timestamp":1497984997000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2012.6263773","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}