{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:43:19Z","timestamp":1729618999931,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/ccnc08.2007.197","type":"proceedings-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T21:26:27Z","timestamp":1202505987000},"page":"843-847","source":"Crossref","is-referenced-by-count":5,"title":["Proxy Framework for Enhanced RFID Security and Privacy"],"prefix":"10.1109","author":[{"given":"Tassos","family":"Dimitriou","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.5"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6"},{"key":"12","article-title":"a scalable, delegatable pseudonym protocol enabling ownership transfer of rfid tags","author":"molnar","year":"2005","journal-title":"Selected Areas in Cryptography"},{"key":"3","article-title":"high-power proxies for enhancing rfid privacy and utility","author":"juels","year":"2005","journal-title":"Center for High Assurance Computer Systems - CHACS 2005"},{"key":"2","first-page":"184","article-title":"rfid guardian: a battery-powered mobile device for rfid privacy management","volume":"3574","author":"rieback","year":"2005","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"10","article-title":"privacy and security in library rfid issues, practices, and architectures","author":"molnar","year":"2004","journal-title":"Conference on Computer and Communication Security"},{"key":"7","first-page":"103121","article-title":"squealing euros: privacy protection in rfid-enabled banknotes","volume":"2742","author":"juels","year":"2003","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20051578"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/11733447_22","article-title":"marp: mobile agent for rfid privacy protection","author":"kim","year":"2006","journal-title":"International Conference on Smart Card Research and Advanced Applications - Cardis"},{"key":"9","article-title":"enhancing rfid privacy through antenna energy analysis","author":"fishkin","year":"2003","journal-title":"MIT RFID Privacy Workshop"},{"key":"8","first-page":"163178","article-title":"universal re-encryption for mixnets","author":"golle","year":"2004","journal-title":"RSA Conference - Cryptographers Track (CTRSA)"}],"event":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","start":{"date-parts":[[2008,1,10]]},"location":"Las Vegas, Nevada, USA","end":{"date-parts":[[2008,1,12]]}},"container-title":["2008 5th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446297\/4446298\/04446495.pdf?arnumber=4446495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T04:22:13Z","timestamp":1497759733000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4446495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc08.2007.197","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}