{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:24Z","timestamp":1738777224857,"version":"3.37.0"},"reference-count":3,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.10.2368-2375","type":"journal-article","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T01:07:47Z","timestamp":1380935267000},"source":"Crossref","is-referenced-by-count":0,"title":["Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm"],"prefix":"10.4304","volume":"8","author":[{"given":"Bin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Li-hui","family":"ZHANG","sequence":"additional","affiliation":[]},{"given":"Xiao-pin","family":"TAN","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,10,4]]},"reference":[{"issue":"No. 3","key":"ref1","first-page":"21","article-title":"RFID Security and Privacy-A Research Survey","volume":"231","author":"Juels","year":"2006","unstructured":"[6] Juels A. \"RFID Security and Privacy-A Research Survey\". IEEE Journal on Selected Areas in Communications. Vol. 231. No. 3. pp. 21-24, 2006.","journal-title":"IEEE J Sel Areas Comm","ISSN":"https:\/\/id.crossref.org\/issn\/0733-8716","issn-type":"print"},{"key":"ref2","volume-title":"Gaydadji N A Platform for RFID Security and rivacy dministration","author":"Rieback","year":"2006","unstructured":"[10] M. R. Rieback, Georgi N. Gaydadji N. A Platform for RFID Security and rivacy dministration. Department of Computer Science Vrije Universiteit, Amsterdam. 2006"},{"key":"ref3","volume-title":"Helmut Knebl Introduction to Cryptography Principles and Applications","author":"Dells","year":"2008","unstructured":"[11] Hans Dells, Helmut Knebl, Introduction to Cryptography: Principles and Applications, Beijing: Tsinghua University press, 2008"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:03:17Z","timestamp":1738774997000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,4]]},"references-count":3,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2013,10,4]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.10.2368-2375","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,10,4]]}}}