{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:04Z","timestamp":1750307464255,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T00:00:00Z","timestamp":1287532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,20]]},"DOI":"10.1145\/1868630.1868648","type":"proceedings-article","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T12:36:11Z","timestamp":1288096571000},"page":"98-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems"],"prefix":"10.1145","author":[{"given":"Gy\u0151z\u0151","family":"G\u00f3odor","sequence":"first","affiliation":[{"name":"Budapest University of Technology and Economics, Budapest, Hungary"}]},{"given":"P\u00e9ter","family":"Szendi","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics, Budapest, Hungary"}]},{"given":"S\u00e1ndor","family":"Imre","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics, Budapest, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2010,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"volume-title":"IEEE Globecom 2008 Computer and Communications Network Security Symposium","year":"2008","author":"G\u00f3dor Gy\u0151z\u0151","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1821748.1821786"},{"key":"e_1_3_2_1_5_1","first-page":"9B","author":"Toiruul Batbold","year":"2006","journal-title":"Number"},{"key":"e_1_3_2_1_6_1","volume":"8","author":"Braun Michael","year":"2008","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2008.20"},{"key":"e_1_3_2_1_8_1","first-page":"291","volume-title":"CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems","author":"Joye Marc","year":"2003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCINS.2010.5541860"},{"key":"e_1_3_2_1_12_1","first-page":"490","volume-title":"Proceedings of Eurocrypt'91","author":"Girault M.","year":"1992"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054143"},{"volume-title":"Workshop on RFID Security, RFIDSec'07","year":"2007","author":"Girault M.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_24"},{"volume-title":"7th International Conference on Information Security and Cryptology 2009 - ICISC 2009","year":"2009","author":"Poschmann Axel","key":"e_1_3_2_1_17_1"}],"event":{"name":"MSWiM '10: The 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Bodrum Turkey","acronym":"MSWiM '10"},"container-title":["Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868630.1868648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:29Z","timestamp":1750248509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868630.1868648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,20]]},"references-count":15,"alternative-id":["10.1145\/1868630.1868648","10.1145\/1868630"],"URL":"https:\/\/doi.org\/10.1145\/1868630.1868648","relation":{},"subject":[],"published":{"date-parts":[[2010,10,20]]},"assertion":[{"value":"2010-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}