{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:10Z","timestamp":1750306270839,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization","award":["U1509219"],"award-info":[{"award-number":["U1509219"]}]},{"name":"Priority Development Field Project of Doctoral Fund","award":["20130073130006"],"award-info":[{"award-number":["20130073130006"]}]},{"name":"Shanghai Municipal Science and Technology Project","award":["16511102605, 16DZ1200702"],"award-info":[{"award-number":["16511102605, 16DZ1200702"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018937","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved group management protocol of RFID password method"],"prefix":"10.1145","author":[{"given":"Tao","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R.CHINA"}]},{"given":"Linsen","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R.CHINA"}]},{"given":"Shiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R.CHINA"}]},{"given":"Gaosheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R.CHINA"}]},{"given":"Zeming","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R.CHINA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Yuichi Kobayashi Toshiyuki Kuwana Yoji Taniguchi Norihisa Komoda \"Group Management of RFID Passwords for Privacy Protection \" Electronics and Communications in Japan Vol. 92 No. 10 2009.  Yuichi Kobayashi Toshiyuki Kuwana Yoji Taniguchi Norihisa Komoda \"Group Management of RFID Passwords for Privacy Protection \" Electronics and Communications in Japan Vol. 92 No. 10 2009.","DOI":"10.1002\/ecj.10106"},{"key":"e_1_3_2_1_2_1","unstructured":"Albrecht K Mcintyre L. Spychips \"How government and major corporations are tracking your every move \" Thomas Nelson 2005.  Albrecht K Mcintyre L. Spychips \"How government and major corporations are tracking your every move \" Thomas Nelson 2005."},{"key":"e_1_3_2_1_3_1","unstructured":"Kinoshita S \"RFID privacy theory \" Nikkei Byte No. 256 pp. 89--96 2004.  Kinoshita S \"RFID privacy theory \" Nikkei Byte No. 256 pp. 89--96 2004."},{"key":"e_1_3_2_1_4_1","unstructured":"\"Privacy protection guideline for RFID Tags \" MIC\/METI 2004. (in Japanese)  \"Privacy protection guideline for RFID Tags \" MIC\/METI 2004. (in Japanese)"},{"key":"e_1_3_2_1_5_1","volume-title":"MIT","author":"Weis S","year":"2003","unstructured":"Weis S , \" Security and privacy in radio-frequency identification devices,\" Master's thesis , MIT , 2003 . Weis S, \"Security and privacy in radio-frequency identification devices,\" Master's thesis, MIT, 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"MIT","author":"Ohkubo M","year":"2003","unstructured":"Ohkubo M , Suzuki K , Kinoshita S , \" Cryptographic approach to a privacy friendly tag,\" RFID Privacy Workshop , MIT , 2003 . Ohkubo M, Suzuki K, Kinoshita S, \"Cryptographic approach to a privacy friendly tag,\" RFID Privacy Workshop, MIT, 2003."},{"key":"e_1_3_2_1_7_1","first-page":"1567","article-title":"ID query protocol for large-scale unlinkable RFID systems","volume":"3","author":"Nohara Y","year":"2005","unstructured":"Nohara Y , \" ID query protocol for large-scale unlinkable RFID systems ,\" Symposium on Cryptography and Information Security , vol 3 , pp. 1567 -- 1572 , 2005 ; Nohara Y et al, \"ID query protocol for large-scale unlinkable RFID systems,\" Symposium on Cryptography and Information Security, vol 3, pp. 1567--1572, 2005;","journal-title":"Symposium on Cryptography and Information Security"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.006"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018937","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:40Z","timestamp":1750221520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":8,"alternative-id":["10.1145\/3018896.3018937","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018937","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}