{"id":"https://openalex.org/W2023883745","doi":"https://doi.org/10.1109/percomw.2012.6197623","title":"Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol","display_name":"Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2023883745","doi":"https://doi.org/10.1109/percomw.2012.6197623","mag":"2023883745"},"language":"en","primary_location":{"id":"doi:10.1109/percomw.2012.6197623","is_oa":false,"landing_page_url":"http://doi.org/10.1109/percomw.2012.6197623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/percomw.2012.6197623","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103065190","display_name":"Farzana Rahman","orcid":"https://orcid.org/0009-0000-6763-6802"},"institutions":[{"id":"https://openalex.org/I102461120","display_name":"Marquette University","ror":"https://ror.org/04gr4te78","country_code":"US","type":"education","lineage":["https://openalex.org/I102461120"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Farzana Rahman","raw_affiliation_strings":["Department of MSCS, Marquette University, Milwaukee, WI, USA"],"affiliations":[{"raw_affiliation_string":"Department of MSCS, Marquette University, Milwaukee, WI, USA","institution_ids":["https://openalex.org/I102461120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080676206","display_name":"Sheikh Iqbal Ahamed","orcid":"https://orcid.org/0000-0001-5385-7647"},"institutions":[{"id":"https://openalex.org/I102461120","display_name":"Marquette University","ror":"https://ror.org/04gr4te78","country_code":"US","type":"education","lineage":["https://openalex.org/I102461120"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sheikh Iqbal Ahamed","raw_affiliation_strings":["Department of MSCS, Marquette University, Milwaukee, WI, USA"],"affiliations":[{"raw_affiliation_string":"Department of MSCS, Marquette University, Milwaukee, WI, USA","institution_ids":["https://openalex.org/I102461120"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103065190"],"corresponding_institution_ids":["https://openalex.org/I102461120"],"apc_list":null,"apc_paid":null,"fwci":1.5615,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84784601,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"e88 b","issue":null,"first_page":"811","last_page":"816"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.8844626545906067},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8010010719299316},{"id":"https://openalex.org/keywords/haystack","display_name":"Haystack","score":0.8006846904754639},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7832086682319641},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6380784511566162},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5125812888145447},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4489533007144928},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4433424472808838},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4075823128223419},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13610824942588806}],"concepts":[{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.8844626545906067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010010719299316},{"id":"https://openalex.org/C13424479","wikidata":"https://www.wikidata.org/wiki/Q5687237","display_name":"Haystack","level":2,"score":0.8006846904754639},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7832086682319641},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6380784511566162},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5125812888145447},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4489533007144928},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4433424472808838},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4075823128223419},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13610824942588806},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/percomw.2012.6197623","is_oa":false,"landing_page_url":"http://doi.org/10.1109/percomw.2012.6197623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops","raw_type":"proceedings-article"},{"id":"pmh:oai:epublications.marquette.edu:mscs_fac-1298","is_oa":false,"landing_page_url":"https://epublications.marquette.edu/mscs_fac/298","pdf_url":null,"source":{"id":"https://openalex.org/S4306401682","display_name":"e-Publications@Marquette (Marquette University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102461120","host_organization_name":"Marquette University","host_organization_lineage":["https://openalex.org/I102461120"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mathematics, Statistics and Computer Science Faculty Research and Publications","raw_type":"text"},{"id":"pmh:oai:zenodo.org:1278688","is_oa":true,"landing_page_url":"https://doi.org/10.1109/percomw.2012.6197623","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:1278688","is_oa":true,"landing_page_url":"https://doi.org/10.1109/percomw.2012.6197623","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1970283599","https://openalex.org/W2002669233","https://openalex.org/W2012886956","https://openalex.org/W2018281194","https://openalex.org/W2031157660","https://openalex.org/W2038638220","https://openalex.org/W2039656688","https://openalex.org/W2050849738","https://openalex.org/W2096356985","https://openalex.org/W2105017410","https://openalex.org/W2112137829","https://openalex.org/W2115290815","https://openalex.org/W2128935842","https://openalex.org/W2133365802","https://openalex.org/W2134011023","https://openalex.org/W2144503234","https://openalex.org/W2147008944","https://openalex.org/W2148579805","https://openalex.org/W2164149078","https://openalex.org/W2170028174","https://openalex.org/W2622601883","https://openalex.org/W2783478601","https://openalex.org/W6658202128","https://openalex.org/W6660094798"],"related_works":["https://openalex.org/W3211012000","https://openalex.org/W3208645214","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2547137208"],"abstract_inverted_index":{"RFID":[0,17,38,105,129],"is":[1,31,122,146],"a":[2,54,113,123],"promising":[3],"technology":[4],"for":[5],"anti-counterfeiting":[6],"since":[7],"it":[8],"facilitates":[9],"processing":[10],"of":[11,66,96,112,115,126,142],"product":[12],"information.":[13],"In":[14,69],"large":[15,64,79,103,127],"scale":[16,80,104,128],"applications":[18],"(such":[19],"as":[20],"-":[21],"supply":[22],"chain,":[23],"retail":[24],"industry,":[25,27],"pharmaceutical":[26],"etc.)":[28],"tag":[29],"authentication":[30,39,67,101,167],"used":[32],"to":[33,48,63,74,92],"detect":[34,75],"counterfeit":[35,76,144,163],"products.":[36],"However,":[37],"protocols":[40],"are":[41],"mainly":[42],"per-tag":[43],"based":[44,89],"where":[45],"reader":[46],"needs":[47],"authenticate":[49],"tags":[50,77,116],"sequentially":[51],"one":[52],"at":[53],"time.":[55],"This":[56],"increases":[57],"the":[58,94,110,140,148,161],"protocol":[59,134],"execution":[60,119,135],"time":[61,120,136],"due":[62],"volume":[65],"data.":[68],"this":[70],"paper,":[71],"we":[72],"propose":[73,87],"in":[78,102],"system":[81],"using":[82],"efficient":[83],"batch":[84,100,114],"authentication.":[85],"We":[86],"FSA":[88],"protocol,":[90],"FTest,":[91],"meet":[93],"requirements":[95],"prompt":[97],"and":[98],"reliable":[99],"applications.":[106],"FTest":[107,131,156],"can":[108,132],"determine":[109],"validity":[111],"with":[117],"minimal":[118],"which":[121],"major":[124],"goal":[125],"systems.":[130],"reduce":[133],"by":[137],"ensuring":[138],"that":[139,155],"percentage":[141],"potential":[143],"products":[145],"under":[147],"user-defined":[149],"threshold.":[150],"The":[151],"experimental":[152],"result":[153],"demonstrates":[154],"performs":[157],"significantly":[158],"better":[159],"than":[160],"existing":[162],"detection":[164],"approaches,":[165],"e.g.":[166],"techniques.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
