{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236912,"version":"3.37.0"},"reference-count":17,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.2925-2933","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":0,"title":["Securing a Smart Anti-counterfeit Web Application"],"prefix":"10.4304","volume":"9","author":[{"given":"Belal","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Morshed","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Jemal","family":"Abawajy","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"volume-title":"The economic impact of counterfeiting","year":"1998","key":"ref1","unstructured":"[4] Organisation for Economic Co-operation and Development. 1998. The economic impact of counterfeiting. Paris: Organisation for Economic Co-operation and Development."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1057\/jt.2008.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/03090560910935451"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/07363769310047374"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0148-2963(95)00009-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/02651339510102949"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0007-6813(89)90027-X"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00179.x"},{"key":"ref9","first-page":"107","article-title":"It's not the real thing. Security Management 36(12): 68-70. Cole, C. A. 1989. Deterrence and consumer fraud.","volume":"65","author":"Cottman","year":"1992","unstructured":"[13] Cottman, L. 1992. It's not the real thing. Security Management 36(12): 68-70. Cole, C. A. 1989. Deterrence and consumer fraud. Journal of Retailing 65: 107-120.","journal-title":"J Retailing","ISSN":"https:\/\/id.crossref.org\/issn\/0022-4359","issn-type":"print"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/cb.231"},{"key":"ref11","volume-title":"RFID Radio Frequency Identification","author":"Shepard","year":"2005","unstructured":"[20] S. Shepard, \"RFID Radio Frequency Identification\", The McGraw-Hall Companies, Inc. USA, 2005."},{"key":"ref12","first-page":"107","article-title":"It's not the real thing. Security Management 36(12): 68-70. Cole, C. A. 1989. Deterrence and consumer fraud.","volume":"65","author":"Cottman","year":"1992","unstructured":"[21] Cottman, L. 1992. It's not the real thing. Security Management 36(12): 68-70. Cole, C. A. 1989. Deterrence and consumer fraud. Journal of Retailing 65: 107-120.","journal-title":"J Retailing","ISSN":"https:\/\/id.crossref.org\/issn\/0022-4359","issn-type":"print"},{"key":"ref13","first-page":"20548","volume-title":"\"Radio Frequency Identification Technology in the Federal Government\" 441 G Street NW","year":"2005","unstructured":"[25] U.S. Government Accountability Office, \"Radio Frequency Identification Technology in the Federal Government\", 441 G Street NW, Room LM Washington, D.C. 20548, 2005."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5207-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"issue":"No. 1","key":"ref16","article-title":"D. Sravana Kumar and A. Chandrasekhar, \"Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields","volume":"36","author":"Suneetha","year":"2011","unstructured":"[35] Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, \"Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields\", International Journal of Computer Applications, Vol. 36, No. 1 November 2011","journal-title":"Int J Comput Appl","ISSN":"https:\/\/id.crossref.org\/issn\/1206-212X","issn-type":"print"},{"key":"ref17","article-title":"Implementation of Elliptic Curve Digital Signature Algorithm","author":"Khalique","year":"2010","unstructured":"[37] Aqeel Khalique, Kuldip Singh and Sandeep Sood (2010), Implementation of Elliptic Curve Digital Signature Algorithm, International Journal of Computer Applications","journal-title":"Int J Comput Appl","ISSN":"https:\/\/id.crossref.org\/issn\/1206-212X","issn-type":"print"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:29Z","timestamp":1738775309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":17,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.2925-2933","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}