{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:37:16Z","timestamp":1729643836818,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/dtis.2013.6527771","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T14:55:29Z","timestamp":1372172129000},"page":"20-24","source":"Crossref","is-referenced-by-count":6,"title":["EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement"],"prefix":"10.1109","author":[{"given":"O.","family":"Abdelmalek","sequence":"first","affiliation":[]},{"given":"D.","family":"Hely","sequence":"additional","affiliation":[]},{"given":"V.","family":"Beroulle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/JCS-2010-0407","article-title":"Practical eavesdropping and skimming attacks on high-frequency rfid tokens","volume":"19","author":"hancke","year":"0","journal-title":"Journal of Computer Security"},{"journal-title":"MicroBlaze Processor Reference Guide Embedded Development Kit EDK 13 1","year":"2010","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2011.5783046"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-010-5191-6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.2007929"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9210-z"},{"journal-title":"EPC Radio Frequency Identity Protocols classe-1 generation-2UHF RFID Protocol for Communications at 860 MHz 960 MHz versionl 0 9","year":"2004","key":"3"},{"key":"2","first-page":"363","author":"hutter","year":"2008","journal-title":"RFID and Its Vulnerability to Faults"},{"journal-title":"Book Chapter in Security in RFID and Sensor Networks 6","year":"0","author":"peris-lopez","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2009.4911188"},{"key":"7","first-page":"48","article-title":"Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm aes implementation","author":"barenghi","year":"2011","journal-title":"In Proc RFIDSec"},{"journal-title":"RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate","year":"2010","author":"fritz","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9210-z"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"9","article-title":"RFID emulation in rifidi environment","author":"palazzi","year":"2009","journal-title":"Proc of the International Symposium on Ubiquitous Computing (UCS'09)"},{"key":"8","article-title":"A simulation tool for rfid epc gen2 protocol","author":"landaluce","year":"2012","journal-title":"Information Systems and Technologies (CISTI) 5th Iberian Conference on"}],"event":{"name":"2013 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","start":{"date-parts":[[2013,3,26]]},"location":"Abu Dhabi","end":{"date-parts":[[2013,3,28]]}},"container-title":["2013 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520922\/6527765\/06527771.pdf?arnumber=6527771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T04:32:55Z","timestamp":1563251575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6527771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dtis.2013.6527771","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}