{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T06:32:10Z","timestamp":1722407530096},"reference-count":16,"publisher":"Scientific Research Publishing, Inc.","issue":"03","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CN"],"published-print":{"date-parts":[[2010]]},"DOI":"10.4236\/cn.2010.23026","type":"journal-article","created":{"date-parts":[[2010,9,17]],"date-time":"2010-09-17T02:00:21Z","timestamp":1284688821000},"page":"183-186","source":"Crossref","is-referenced-by-count":39,"title":["An Introduction to RFID Technology"],"prefix":"10.4236","volume":"02","author":[{"given":"Sanjay","family":"Ahuja","sequence":"first","affiliation":[]},{"given":"Pavan","family":"Potti","sequence":"additional","affiliation":[]}],"member":"2751","reference":[{"key":"ref","doi-asserted-by":"crossref","unstructured":"Roy Want, \u201cAn Introduction to RFID Technology,\u201d IEEE CS and IEEE ComSoc, Vol. 5, No. 1, Santa Clara, 2006, PP. 25-33.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Ron Weinstein, \u201cRFID: A Technical Overview and Its Application to the Enterprise,\u201d IT Pro-fessional, Vol. 7, No. 3, June 2005, pp. 27-33.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Klaus Finkenzeller, \u201cRFID Handbook,\u201d 2nd edition, John Wiley & Sons, Ciudad Real, 2003.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Badri Nath, Franklin Reynolds, Roy Want, \u201cRFID Technology and Applications,\u201d IEEE CS and IEEE ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Timo Salminen, Simo Hosio and Jukka Riekki, \u201cEnhancing Bluetooth Connectivity with RFID,\u201d Proceedings of the Fourth Annual IEEE International Conference on Perva-sive Computing on Pervasive Computing and Communi-cations, Pisa, 2006, pp. 6-41.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Lei Zhang and Zhi Wang, \u201cIntegration of RFID into Wireless Sensor Net-works: Architectures, Opportunities and Challenging Problems,\u201d Proceedings of the Fifth International Confe-rence on Grid and Cooperative Computing Workshops, Hunan, 2006, pp.463-469.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"N.Krahntoever, J.Rittscher, P.Tu, K.Chean and T.Tomlin-son, \u201cActivity Recognition Using Visual Tracking and RFID,\u201d Pro-ceedings of the Seventh IEEE Workshop on Applications for Computer Vision, Vol. 1, New York ,2005, pp. 494-500.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Melanie R.Rieback, Bruno Crispo and Andrew S.Tanen-baum, \u201cRFID Malware,\u201d IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 70-72.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Hyun-Seok Kim, Jeong-Hyum Ob and Jin-Young Choi, \u201cSecurity Analysis of RFID Authentica-tion for Pervasive Systems using Model Checking,\u201d Pro-ceedings of the 30th Annual International Computer Software and Applications Conference, Vol. 2, Chicago, 2006, pp. 195-202.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi and Jin-Woo Kim, \u201cThe Vulnerabilities Analysis and Design of the Security Protocol for RFID System,\u201d Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, Seoul, 2006, p.152.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Simon L.Garfinkel, Ari Juels and Ravi Pappu, \u201cRFID Privacy: An Overview of Prob-lems and Proposed Solutions,\u201d IEEE Security and Privacy, Vol. 3, No. 3, Massachusetts, 2005, pp.34-43.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Fred Niederman, Richard G.Mathieu, Roger Morley, and Ik-Whan Kwon, \u201cExamining RFID Applications in Supply Caching Management,\u201d Communications of the ACM, Vol. 50, No. 7, July 2007, pp. 92-101.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Zoltan Nochta, Thorsten Staake and Elgar Fleisch, \u201cProduct Specific Security Features Based on RFID Technology,\u201d Proceedings of the International Symposium on Applications and the Internet Workshops, Phoenix, 2005. pp. 4-75.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Ramaswamy Chandramouli, Tim Grance, Rick kuhn, and Susan Landau, \u201cSecurity Standards for the RFID Market,\u201d IEEE Security and Privacy, Vol. 3, No. 6, McLean, 2005, pp. 85-89.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Katina Michael and Luke McCathie, \u201cThe Pros and Cons of RFID in Supply Chain Management,\u201d Proceedings of the International Conference on Mobile Business, Sydney, 2005, pp. 623-629.","DOI":"10.1109\/MPRV.2006.17"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Melanie R.Rieback, Bruno Crispo and Andrew S. Tanenbaum, \u201cThe Evolution of RFID Security,\u201d IEEE Pervasive Computing, Vol. 5, No. 1, 2006, pp. 62-69.","DOI":"10.1109\/MPRV.2006.17"}],"container-title":["Communications and Network"],"original-title":[],"link":[{"URL":"http:\/\/www.scirp.org\/journal\/PaperDownload.aspx?DOI=10.4236\/cn.2010.23026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.23026","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.23026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T08:39:57Z","timestamp":1499762397000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.23026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":16,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2010]]}},"URL":"https:\/\/doi.org\/10.4236\/cn.2010.23026","relation":{},"ISSN":["1949-2421","1947-3826"],"issn-type":[{"value":"1949-2421","type":"print"},{"value":"1947-3826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}