{"id":"https://openalex.org/W4207023989","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682172","title":"Lightweight RFID Ownership Transfer Protocol Based on Blockchain","display_name":"Lightweight RFID Ownership Transfer Protocol Based on Blockchain","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4207023989","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682172"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps52748.2021.9682172","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682172","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028747587","display_name":"Dong Qingkaun","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Qingkaun","raw_affiliation_strings":["Xidian University, Xi\u2019an, P. R. China","Xidian University, Xi'an, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, P. R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038547306","display_name":"Gao Wenxin","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gao Wenxin","raw_affiliation_strings":["Xidian University, Xi\u2019an, P. R. China","Xidian University, Xi'an, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, P. R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361370","display_name":"Li Li","orcid":"https://orcid.org/0000-0003-3138-6033"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["Xidian University, Xi\u2019an, P. R. China","Xidian University, Xi'an, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, P. R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ren Xiaolong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ren Xiaolong","raw_affiliation_strings":["Xidian University, Xi\u2019an, P. R. China","Xidian University, Xi'an, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, P. R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082264131","display_name":"Zhao Xiaoqian","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhao Xiaoqian","raw_affiliation_strings":["Xidian University, Xi\u2019an, P. R. China","Xidian University, Xi'an, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, P. R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, P. R. China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028747587"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.2538,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53650647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"45","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7621769905090332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7407090067863464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6125597953796387},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5856596827507019},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5788076519966125},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5785356163978577},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5067892670631409},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5037369132041931},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4994778633117676},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42629408836364746},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4241527318954468},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4145074188709259},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37975838780403137},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1790425181388855}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7621769905090332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7407090067863464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6125597953796387},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5856596827507019},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5788076519966125},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5785356163978577},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5067892670631409},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5037369132041931},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4994778633117676},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42629408836364746},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4241527318954468},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4145074188709259},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37975838780403137},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1790425181388855},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps52748.2021.9682172","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682172","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1890078278","https://openalex.org/W1980199677","https://openalex.org/W2054874293","https://openalex.org/W2405499490","https://openalex.org/W2753962503","https://openalex.org/W2886209944","https://openalex.org/W3151068690"],"related_works":["https://openalex.org/W2944823289","https://openalex.org/W3037018281","https://openalex.org/W2003209439","https://openalex.org/W4321854979","https://openalex.org/W2358319515","https://openalex.org/W2972592048","https://openalex.org/W4312214821","https://openalex.org/W2497626292","https://openalex.org/W2390344072","https://openalex.org/W1611563112"],"abstract_inverted_index":{"With":[0],"regard":[1],"to":[2,116,129,180],"current":[3],"RFID":[4,106],"tags,":[5],"as":[6],"their":[7],"owners":[8],"change":[9],"during":[10],"the":[11,14,17,22,25,35,60,65,87,90,123,134,139,143,151,155,161,182,192,196,200,205],"circulation":[12],"process,":[13,92],"ownership":[15,50,83,107,185,208],"of":[16,59,89,133,184,191,207],"tags":[18],"is":[19,28,32,38,148],"transferred,":[20],"and":[21,56,73,93,160,203],"data":[23,75],"containing":[24],"tag":[26,118],"information":[27,63],"also":[29],"transferred.":[30],"Data":[31],"stored":[33],"in":[34],"blockchain,":[36],"which":[37],"a":[39,45,53,104,112,175],"distributed":[40],"ledger":[41],"system":[42],"maintained":[43],"by":[44,142],"decentralized":[46],"collective.":[47],"A":[48],"complete":[49],"transfer":[51,108],"requires":[52],"download,":[54],"decryption,":[55],"encrypted":[57,135,141,153],"upload":[58],"label":[61],"content":[62,119],"from":[64],"blockchain":[66,124],"server.":[67],"This":[68,172],"mode":[69],"will":[70,94],"bring":[71,95],"tedious":[72],"repetitive":[74],"processing":[76],"problems":[77],"when":[78],"carrying":[79],"out":[80],"multiple":[81],"consecutive":[82],"transfers.":[84],"Seriously":[85],"affect":[86],"efficiency":[88,206],"entire":[91],"safety":[96],"issues.":[97],"For":[98],"this":[99,101],"reason,":[100],"paper":[102,173],"proposes":[103],"lightweight":[105,176],"protocol":[109,193,198],"that":[110,138,195],"uses":[111,126,174],"proxy":[113,127],"re-encryption":[114,128],"algorithm":[115],"process":[117],"information.":[120],"That":[121],"is,":[122],"server":[125],"perform":[130],"ciphertext":[131,140,152],"conversion":[132],"information,":[136],"so":[137],"user":[144,156,162],"Alice's":[145],"public":[146,158],"key":[147],"converted":[149],"into":[150],"with":[154,168],"Bob's":[157],"key,":[159],"Bob":[163],"can":[164],"directly":[165],"decrypt":[166],"it":[167],"his":[169],"private":[170],"key.":[171],"hash":[177],"function":[178],"calculation":[179],"ensure":[181],"security":[183,189,201],"transfer.":[186,209],"The":[187],"experimental":[188],"analysis":[190],"show":[194],"proposed":[197],"meets":[199],"requirements":[202],"improves":[204]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-10-10T00:00:00"}
