{"id":"https://openalex.org/W2731555090","doi":"https://doi.org/10.1109/sera.2017.7965702","title":"A bisectional multivariate quadratic equation system for RFID anti-counterfeiting","display_name":"A bisectional multivariate quadratic equation system for RFID anti-counterfeiting","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2731555090","doi":"https://doi.org/10.1109/sera.2017.7965702","mag":"2731555090"},"language":"en","primary_location":{"id":"doi:10.1109/sera.2017.7965702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sera.2017.7965702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067794581","display_name":"Xiaoyi Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyi Zhou","raw_affiliation_strings":["College of Information Science and Technology, Hainan University, Haikou, Hainan"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Hainan University, Haikou, Hainan","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028687432","display_name":"Xiaoming Yao","orcid":"https://orcid.org/0000-0003-2959-3500"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoming Yao","raw_affiliation_strings":["College of Information Science and Technology, Hainan University, Haikou, Hainan"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Hainan University, Haikou, Hainan","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100321709","display_name":"Honglei Li","orcid":"https://orcid.org/0000-0002-5446-4500"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Honglei Li","raw_affiliation_strings":["College of Information Science and Technology, Hainan University, Haikou, Hainan"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Hainan University, Haikou, Hainan","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018649943","display_name":"Jixin Ma","orcid":"https://orcid.org/0000-0001-7458-7412"},"institutions":[{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jixin Ma","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Greenwich, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Greenwich, London, United Kingdom","institution_ids":["https://openalex.org/I55060895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067794581"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07224564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":null,"first_page":"19","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5462597608566284},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5201021432876587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5059201121330261},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41459283232688904},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3473442494869232},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0987565815448761},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09230601787567139}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5462597608566284},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5201021432876587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5059201121330261},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41459283232688904},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3473442494869232},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0987565815448761},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09230601787567139}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sera.2017.7965702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sera.2017.7965702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2112137829","https://openalex.org/W2115439808","https://openalex.org/W2387977561","https://openalex.org/W2393547267","https://openalex.org/W7005563218"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2317200988","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,39,80,88,101,123],"novel":[4],"scheme":[5],"for":[6],"RFID":[7],"anti-counterfeiting":[8],"by":[9],"applying":[10],"bisectional":[11],"multivariate":[12],"quadratic":[13],"equations":[14],"(BMQE)":[15],"system":[16],"into":[17,100],"an":[18,150],"RF":[19],"tag":[20],"data":[21],"encryption.":[22],"In":[23,91],"the":[24,92,95,159,163,179],"key":[25,82],"generation":[26],"process,":[27,94],"arbitrarily":[28],"choose":[29],"two":[30],"matrix":[31,126],"sets":[32],"(denoted":[33,59],"as":[34,60,79,87,149],"A":[35],"and":[36,38,54,83,137,182],"B)":[37],"base":[40],"Rab":[41],"such":[42],"that":[43],"[AB]":[44],"=":[45],"\u03bbR":[46],"<sub":[47,66,72,105,111,118,129,139,144,154],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[48,51,67,73,106,112,119,130,140,145,155],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AB</sub>":[49],"<sup":[50],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T</sup>":[52],",":[53,75,142],"generate":[55],"2n":[56],"BMQ":[57],"polynomials":[58],"p)":[61,76],"over":[62,127,152],"finite":[63],"field":[64],"F":[65,128,153],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">q</sub>":[68,74,131],".":[69,108,132,157],"Therefore,":[70],"(F":[71],"is":[77,98,114,122,147,167,174],"taken":[78],"public":[81],"(A,":[84,134],"B,":[85,135],"\u03bb)":[86,136],"private":[89],"key.":[90],"encryption":[93],"EPC":[96],"code":[97],"hashed":[99],"message":[102],"digest":[103],"d":[104,110],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</sub>":[107,113,120,141,146],"Then":[109],"padded":[115],"to":[116,177],"d'":[117,138],"which":[121],"non-zero":[124],"2n\u00d72n":[125],"With":[133],"S":[143],"formed":[148],"n-vector":[151],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[156],"Unlike":[158],"existing":[160,180],"anti-counterfeit":[161],"scheme,":[162],"one":[164],"we":[165],"proposed":[166],"based":[168],"on":[169],"quantum":[170],"cryptography,":[171],"thus":[172],"it":[173],"robust":[175],"enough":[176],"resist":[178],"attacks":[181],"has":[183],"high":[184],"security.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
