{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:44:32Z","timestamp":1742399072676},"reference-count":18,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1016\/j.engappai.2008.10.022","type":"journal-article","created":{"date-parts":[[2009,1,10]],"date-time":"2009-01-10T06:12:00Z","timestamp":1231567920000},"page":"1284-1291","source":"Crossref","is-referenced-by-count":72,"title":["Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection"],"prefix":"10.1016","volume":"22","author":[{"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yong-Yuan","family":"Deng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.engappai.2008.10.022_bib1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7","article-title":"RFID technology: supply-chain applications and implementations issues","volume":"22","author":"Angeles","year":"2005","journal-title":"Information Systems Management"},{"issue":"3","key":"10.1016\/j.engappai.2008.10.022_bib2","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.cose.2005.11.008","article-title":"Security implications in RFID and authentication processing framework","volume":"25","author":"Ayoade","year":"2006","journal-title":"Computers & Security"},{"issue":"2","key":"10.1016\/j.engappai.2008.10.022_bib3","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.csi.2006.04.004","article-title":"Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards","volume":"29","author":"Chien","year":"2007","journal-title":"Computer Standards and Interfaces"},{"key":"10.1016\/j.engappai.2008.10.022_bib4","unstructured":"Dimitriou, T., 2005. A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks Secure Comm."},{"key":"10.1016\/j.engappai.2008.10.022_bib5","unstructured":"EPC (Electronic Product Code) Class1 Generation2 standard by EPCglobal, 2008. Description at \u3008http:\/\/www.epcglobalinc.org\/\u3009 (access available on 15 March 2008)."},{"key":"10.1016\/j.engappai.2008.10.022_bib6","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R., 2005. RFID Privacy: An overview of problems and proposed solutions, IEEE Security & Privacy, the Claremont Resort, Berkeley\/Oakland, California, pp. 34\u201343.","DOI":"10.1109\/MSP.2005.78"},{"key":"10.1016\/j.engappai.2008.10.022_bib7","unstructured":"Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J., Song, S., 2004. An approach to security and privacy of RFID system for supply chain. IEEE International Conference on E-Commerce Technology for Dynamic E-Business 164\u2013168"},{"year":"2003","series-title":"The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, 8th ACM Conference on Computer and Communications Security","author":"Juels","key":"10.1016\/j.engappai.2008.10.022_bib8"},{"issue":"10","key":"10.1016\/j.engappai.2008.10.022_bib9","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1108\/09590550310497058","article-title":"Increasing efficiency in the supply chain for short shelf life goods using RFID tagging","volume":"31","author":"Karkkainen","year":"2003","journal-title":"International Journal of Retail & Distribution Management"},{"key":"10.1016\/j.engappai.2008.10.022_bib10","doi-asserted-by":"crossref","unstructured":"Karthikeyan, S., Nesterenko, M., 2005. RFID security without extensive cryptography. In: Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63\u201367.","DOI":"10.1145\/1102219.1102229"},{"key":"10.1016\/j.engappai.2008.10.022_bib11","unstructured":"Konidala, D.M., Kim, K., 2006. Mobile RFID Security Issues, The 2006 Symposium on Cryptography and Information Security (SCIS 2006), Hiroshima, Japan, Available online \u3008http:\/\/caisLaboratoryicu.ac.kr\/Paper\/paper_files\/2006\/Divyan_SCIS06.pdf\u3009"},{"key":"10.1016\/j.engappai.2008.10.022_bib12","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S., 2003. Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, Bartos Theatre, MIT Media Lab., MIT."},{"key":"10.1016\/j.engappai.2008.10.022_bib13","doi-asserted-by":"crossref","unstructured":"Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O., 2006. An efficient and secure RFID security method with ownership transfer, IEEE International Conference on Computational Intelligence and Security 1090\u20131095.","DOI":"10.1109\/ICCIAS.2006.295430"},{"key":"10.1016\/j.engappai.2008.10.022_bib14","first-page":"879","article-title":"Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags, EUC","volume":"3207","author":"Saito","year":"2004","journal-title":"LNCS"},{"key":"10.1016\/j.engappai.2008.10.022_bib15","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W., 2002. Radio-frequency identification systems. In: Kaliski Jr., Burton S., Koc, Cetin Kaya., Paar, Christof. (Eds.), CHES \u201902. LNCS, Vol. 2523, Springer, pp. 454\u2013469."},{"issue":"6","key":"10.1016\/j.engappai.2008.10.022_bib16","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.bushor.2004.09.009","article-title":"Radio frequency ID technology: the next revolution in SCM","volume":"47","author":"Srivastava","year":"2004","journal-title":"Business Horizons"},{"key":"10.1016\/j.engappai.2008.10.022_bib17","unstructured":"Vajda, I., Butty\u2019an, L., 2003. Lightweight authentication protocols for low-cost RFID tags. In: Second Workshop on Security in Ubiquitous Computing. Seattle, Washington. Available online \u3008http:\/\/www.hit.bme.hu\/~buttyan\/publications\/VajdaB03suc.pdf\u3009."},{"key":"10.1016\/j.engappai.2008.10.022_bib18","unstructured":"Wang, S.W., Chen, W.H., Ong, C.S., Liu, L., Chuang, Y.W., 2006. RFID applications in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Proceedings of the 39th Hawaii International Conference on System Sciences. Vol. 8, p. 10."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197608001814?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197608001814?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T01:07:18Z","timestamp":1558055238000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197608001814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["S0952197608001814"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2008.10.022","relation":{},"ISSN":["0952-1976"],"issn-type":[{"type":"print","value":"0952-1976"}],"subject":[],"published":{"date-parts":[[2009,12]]}}}