{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T16:04:06Z","timestamp":1762445046052,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.23919\/cisti49556.2020.9140943","type":"proceedings-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T21:29:00Z","timestamp":1594848540000},"page":"1-5","source":"Crossref","is-referenced-by-count":10,"title":["Hacking the RFID-based Authentication System of a University Campus on a Budget"],"prefix":"10.23919","author":[{"given":"Hugo","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Rui","family":"Carreira","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Sergio I.","family":"Lopes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2009.113"},{"key":"ref11","first-page":"40","article-title":"Lightweight secure search protocols for low-cost RFID systems","author":"lars","year":"2009","journal-title":"Proceedings - International Conference on Distributed Computing Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2014.6934242"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13102-3_32"},{"journal-title":"NXP Semiconductors MFRC522 Standard performance MIFARE and NTAG frontend Technical report","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/9780470168226"},{"journal-title":"Rfid Applications Security And Privacy - Simon Garfinkel Beth Rosenberg - Google Books","year":"2006","author":"garfinkel","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.186"},{"key":"ref3","first-page":"10","article-title":"Technologies for secure RFID authentication of medicinal pills and capsules","author":"richard carley","year":"2016","journal-title":"2016 IEEE Int Conf RFID Technol Appl RFID-TA 2016"},{"journal-title":"A RFID-based Campus Context-Aware Notification System","year":"2010","author":"haron","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s150715988"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74377-4_81"},{"journal-title":"ICT and RFID in Education Some Practical Aspects in Campus Life","year":"2015","author":"turcu","key":"ref7"},{"key":"ref2","first-page":"282","article-title":"Avery Williamson, Li-Shiang Tsay, Ibraheem A. Kateeb, and Larry Burton","volume":"4","year":"2013","journal-title":"&#x201C;Solutions for RFID Smart Tagged Card Security Vulnerabilities&#x201D; AASRI Procedia"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2011.7.4.561"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"}],"event":{"name":"2020 15th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2020,6,24]]},"location":"Sevilla, Spain","end":{"date-parts":[[2020,6,27]]}},"container-title":["2020 15th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9137058\/9140439\/09140943.pdf?arnumber=9140943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:54:30Z","timestamp":1597096470000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cisti49556.2020.9140943","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}