{"id":"https://openalex.org/W2087019220","doi":"https://doi.org/10.1145/1229285.1229318","title":"Protecting RFID communications in supply chains","display_name":"Protecting RFID communications in supply chains","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W2087019220","doi":"https://doi.org/10.1145/1229285.1229318","mag":"2087019220"},"language":"en","primary_location":{"id":"doi:10.1145/1229285.1229318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/548","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111386964","display_name":"Yingjiu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Yingjiu Li","raw_affiliation_strings":["Singapore Management University, Singapore","Singapore Management University, SINGAPORE"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]},{"raw_affiliation_string":"Singapore Management University, SINGAPORE","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070236605","display_name":"Xuhua Ding","orcid":"https://orcid.org/0000-0003-3974-590X"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Xuhua Ding","raw_affiliation_strings":["Singapore Management University, Singapore","Singapore Management University, SINGAPORE"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]},{"raw_affiliation_string":"Singapore Management University, SINGAPORE","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111386964"],"corresponding_institution_ids":["https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":23.098,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.99517435,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"234","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.7765637040138245},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6718789935112},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6222040057182312},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6055259704589844},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5281365513801575},{"id":"https://openalex.org/keywords/supply-chain-management","display_name":"Supply chain management","score":0.518511176109314},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4737711250782013},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3516538739204407},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22435635328292847}],"concepts":[{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.7765637040138245},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6718789935112},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6222040057182312},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6055259704589844},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5281365513801575},{"id":"https://openalex.org/C44104985","wikidata":"https://www.wikidata.org/wiki/Q492886","display_name":"Supply chain management","level":3,"score":0.518511176109314},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4737711250782013},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3516538739204407},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22435635328292847},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1229285.1229318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-1547","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/548","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dx.doi.org/10.1145/1229285.1229318","raw_type":"Conference Proceeding Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-1547","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/548","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dx.doi.org/10.1145/1229285.1229318","raw_type":"Conference Proceeding Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W201916924","https://openalex.org/W233279079","https://openalex.org/W1493649314","https://openalex.org/W1495086674","https://openalex.org/W1522971697","https://openalex.org/W1543036588","https://openalex.org/W1631383219","https://openalex.org/W1660562555","https://openalex.org/W1774699283","https://openalex.org/W1865728529","https://openalex.org/W1913505164","https://openalex.org/W1979154698","https://openalex.org/W1993546472","https://openalex.org/W2020867809","https://openalex.org/W2036534296","https://openalex.org/W2083631211","https://openalex.org/W2108458831","https://openalex.org/W2112137829","https://openalex.org/W2131300413","https://openalex.org/W2134011023","https://openalex.org/W2293748320","https://openalex.org/W4299301436","https://openalex.org/W6629465392","https://openalex.org/W6636975353","https://openalex.org/W7058223184"],"related_works":["https://openalex.org/W2767550285","https://openalex.org/W2620085874","https://openalex.org/W2064496565","https://openalex.org/W2108330697","https://openalex.org/W2983500849","https://openalex.org/W3024999678","https://openalex.org/W2535281349","https://openalex.org/W388184414","https://openalex.org/W2026811664","https://openalex.org/W2477045221"],"abstract_inverted_index":{"Recent":[0],"years":[1],"have":[2],"seen":[3],"much":[4],"growing":[5],"attention":[6],"on":[7],"RFID":[8,35,38,53,88],"security.":[9],"However,":[10],"little":[11],"work":[12],"has":[13],"been":[14],"performed":[15],"to":[16,56,70,82],"address":[17],"the":[18,22,31,72,93],"security":[19,54,76,94],"issues":[20],"in":[21,44,78],"context":[23],"of":[24,48,51,66,75,87],"supply":[25,60,79],"chain":[26,61],"management,":[27],"which":[28],"is":[29,69],"exactly":[30],"major":[32,64],"field":[33,46],"for":[34,59],"applications.":[36],"Existing":[37],"solutions":[39],"cannot":[40],"be":[41,57],"applied":[42],"directly":[43],"this":[45,67],"because":[47],"a":[49,84],"set":[50,74],"special":[52],"requirements":[55,77],"addressed":[58],"management.":[62],"The":[63],"contribution":[65],"paper":[68],"identify":[71],"unique":[73],"chains":[80],"and":[81],"propose":[83],"practical":[85],"design":[86],"communication":[89],"protocols":[90],"that":[91],"satisfy":[92],"requirements.":[95]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":16}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
