{"id":"https://openalex.org/W2134011023","doi":"https://doi.org/10.1145/1030083.1030112","title":"Privacy and security in library RFID","display_name":"Privacy and security in library RFID","publication_year":2004,"publication_date":"2004-10-25","ids":{"openalex":"https://openalex.org/W2134011023","doi":"https://doi.org/10.1145/1030083.1030112","mag":"2134011023"},"language":"en","primary_location":{"id":"doi:10.1145/1030083.1030112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101905586","display_name":"D\u00e1vid Moln\u00e1r","orcid":"https://orcid.org/0000-0002-2398-4984"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Molnar","raw_affiliation_strings":["University of California at Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California at Berkeley","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101823734","display_name":"David Wagner","orcid":"https://orcid.org/0000-0002-9933-518X"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Wagner","raw_affiliation_strings":["University of California at Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California at Berkeley","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101905586"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":89.9542,"has_fulltext":false,"cited_by_count":686,"citation_normalized_percentile":{"value":0.9998834,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"210","last_page":"219"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5776172876358032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5610727071762085},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5101654529571533}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5776172876358032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5610727071762085},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5101654529571533}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1030083.1030112","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030112","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W77932805","https://openalex.org/W100686501","https://openalex.org/W1502376032","https://openalex.org/W1869424451","https://openalex.org/W2036534296","https://openalex.org/W2112137829","https://openalex.org/W3186546642","https://openalex.org/W3203992401","https://openalex.org/W4235547147","https://openalex.org/W4285719527","https://openalex.org/W6639167017"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"We":[0,77,130,167],"expose":[1],"privacy":[2,58,65],"issues":[3],"related":[4],"to":[5,33,74,113,118],"Radio":[6],"Frequency":[7],"Identification":[8],"(RFID)":[9],"in":[10,125,142],"libraries,":[11],"describe":[12],"current":[13],"deployments,":[14],"and":[15,41,99],"suggest":[16],"novel":[17],"architectures":[18],"for":[19,135],"library":[20,49,75],"RFID.":[21],"Libraries":[22],"are":[23,67],"a":[24,91,97,103,132,148,154,170,177],"fast":[25],"growing":[26],"application":[27],"of":[28,128,145,161],"RFID;":[29],"the":[30,82,126,143],"technology":[31],"promises":[32],"relieve":[34],"repetitive":[35],"strain":[36],"injury,":[37],"speed":[38],"patron":[39,57],"self-checkout,":[40],"make":[42],"possible":[43],"comprehensive":[44],"inventory.":[45],"Unlike":[46],"supply-chain":[47],"RFID,":[48],"RFID":[50,165],"requires":[51],"item-level":[52],"tagging,":[53],"thereby":[54],"raising":[55],"immediate":[56],"issues.":[59],"Current":[60],"conventional":[61],"wisdom":[62],"suggests":[63],"that":[64,101,173],"risks":[66],"negligible":[68],"unless":[69],"an":[70,114],"adversary":[71],"has":[72],"access":[73],"databases.":[76],"show":[78],"this":[79,119],"is":[80],"not":[81],"case.":[83],"In":[84],"addition,":[85],"we":[86],"identify":[87],"private":[88,137],"authentication":[89,138],"as":[90,153],"key":[92],"technical":[93],"issue:":[94],"how":[95],"can":[96],"reader":[98,122],"tag":[100],"share":[102],"secret":[104],"efficiently":[105],"authenticate":[106],"each":[107],"other":[108,187],"without":[109,183],"revealing":[110],"their":[111],"identities":[112],"adversary?":[115],"Previous":[116],"solutions":[117],"problem":[120],"require":[121],"work":[123,140,152],"linear":[124,151],"number":[127,144],"tags.":[129],"give":[131,169],"general":[133],"scheme":[134,149,158,172],"building":[136],"with":[139,150],"logarithmic":[141],"tags,":[146],"given":[147],"sub":[155],"protocol.":[156],"This":[157],"may":[159],"be":[160],"independent":[162],"interest":[163],"beyond":[164],"applications.":[166],"also":[168],"simple":[171],"provides":[174],"security":[175],"against":[176],"passive":[178],"eavesdropper":[179],"using":[180],"XOR":[181],"alone,":[182],"pseudo-random":[184],"functions":[185],"or":[186],"heavy":[188],"crypto":[189],"operations.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":20},{"year":2016,"cited_by_count":22},{"year":2015,"cited_by_count":23},{"year":2014,"cited_by_count":32},{"year":2013,"cited_by_count":46},{"year":2012,"cited_by_count":67}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
