{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:03Z","timestamp":1755838383878,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T00:00:00Z","timestamp":1407715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,11]]},"DOI":"10.1145\/2632951.2632963","type":"proceedings-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:39Z","timestamp":1406924019000},"page":"347-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Wise counting"],"prefix":"10.1145","author":[{"given":"Wei","family":"Gong","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, Canada"}]},{"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Industry Report","author":"Sullivan Frost","year":"2011","unstructured":"Frost & Sullivan . Global RFID Healthcare and Pharmaceutical Market . Industry Report , 2011 . Frost & Sullivan. Global RFID Healthcare and Pharmaceutical Market. Industry Report, 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"Industry Report","author":"Sullivan Frost","year":"2011","unstructured":"Frost & Sullivan . Global RFID market . Industry Report , 2011 . Frost & Sullivan. Global RFID market. Industry Report, 2011."},{"key":"e_1_3_2_1_3_1","volume-title":"www.rfidjournal.com\/article\/view\/9819","author":"Is How RFID","year":"2012","unstructured":"How RFID Is Transforming VA Hospital Operations . www.rfidjournal.com\/article\/view\/9819 , 2012 . How RFID Is Transforming VA Hospital Operations. www.rfidjournal.com\/article\/view\/9819, 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_11"},{"key":"e_1_3_2_1_5_1","author":"Collins J.","year":"2004","unstructured":"J. Collins . Hong Kong's Airport to Tag Bags . RFID Journal , 2004 . J. Collins. Hong Kong's Airport to Tag Bags. RFID Journal, 2004.","journal-title":"RFID Journal"},{"key":"e_1_3_2_1_6_1","volume-title":"Forrester Research","author":"Pelino M.","year":"2011","unstructured":"M. Pelino , C. Mines , J. Warner , and S. Musto . M2M Connectivity Helps Telcos Offset Declining Traditional Services . Forrester Research , 2011 . M. Pelino, C. Mines, J. Warner, and S. Musto. M2M Connectivity Helps Telcos Offset Declining Traditional Services. Forrester Research, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0104-56"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of IEEE ICNP","author":"Ma D.","year":"2013","unstructured":"D. Ma , C. Qian , W. Li , J. Han , and J. Zhao . GenePrint: Generic and Accurate Physical-layer Identification for UHF RFID Tags . In Proc. of IEEE ICNP , 2013 . D. Ma, C. Qian, W. Li, J. Han, and J. Zhao. GenePrint: Generic and Accurate Physical-layer Identification for UHF RFID Tags. In Proc. of IEEE ICNP, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847970"},{"key":"e_1_3_2_1_10_1","unstructured":"EPCglobal Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960MHz 2008.  EPCglobal Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960MHz 2008."},{"key":"e_1_3_2_1_11_1","first-page":"50","volume-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in pervasive computing","author":"Weis S.","year":"2004","unstructured":"S. Weis , S. Sarma , R. Rivest , and D. Engels . Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in pervasive computing , pages 50 -- 59 , 2004 . S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in pervasive computing, pages 50--59, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.13"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062117"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"e_1_3_2_1_15_1","volume-title":"The Economist","author":"The","year":"2010","unstructured":"The spread of counterfeiting: Knock-offs catch on . The Economist , 2010 . The spread of counterfeiting: Knock-offs catch on. The Economist, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491299"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833674"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491290"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847972"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566880"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.208"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847973"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.67"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.145"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161126"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"Motwani Rajeev","year":"1995","unstructured":"Rajeev Motwani . Randomized Algorithms . Cambridge university press , 1995 . Rajeev Motwani. Randomized Algorithms. Cambridge university press, 1995."},{"key":"e_1_3_2_1_29_1","volume-title":"Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights","author":"ICC Counterfeiting Intelligence Bureau","year":"1997","unstructured":"ICC Counterfeiting Intelligence Bureau . Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights . 1997 . ICC Counterfeiting Intelligence Bureau. Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights. 1997."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.58"},{"key":"e_1_3_2_1_31_1","volume-title":"Parameters for air interface communications at 860 MHz to 960 MHz","author":"Information","year":"2010","unstructured":"Information technology Radio frequency identification for item management Part 6 : Parameters for air interface communications at 860 MHz to 960 MHz , 2010 . Information technology Radio frequency identification for item management Part 6: Parameters for air interface communications at 860 MHz to 960 MHz, 2010."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of IEEE RFID","author":"Lee Y.K.","year":"2009","unstructured":"Y.K. Lee , L. Batina , and I. Verbauwhede . Untraceable RFID authentication protocols: Revision of EC-RAC . In Proc. of IEEE RFID , 2009 . Y.K. Lee, L. Batina, and I. Verbauwhede. Untraceable RFID authentication protocols: Revision of EC-RAC. In Proc. of IEEE RFID, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833640"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833676"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.36"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.238"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348588"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2192448"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847971"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500431"},{"key":"e_1_3_2_1_42_1","unstructured":"Open RFID lab http:\/\/pdcc.ntu.edu.sg\/wands\/orl.  Open RFID lab http:\/\/pdcc.ntu.edu.sg\/wands\/orl."}],"event":{"name":"MobiHoc'14: The Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Philadelphia Pennsylvania USA","acronym":"MobiHoc'14"},"container-title":["Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632951.2632963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:08Z","timestamp":1750230068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632963"}},"subtitle":["fast and efficient batch authentication for large-scale RFID systems"],"short-title":[],"issued":{"date-parts":[[2014,8,11]]},"references-count":41,"alternative-id":["10.1145\/2632951.2632963","10.1145\/2632951"],"URL":"https:\/\/doi.org\/10.1145\/2632951.2632963","relation":{},"subject":[],"published":{"date-parts":[[2014,8,11]]},"assertion":[{"value":"2014-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}