{"id":"https://openalex.org/W2053998779","doi":"https://doi.org/10.1145/1741866.1741884","title":"Privacy-preserving computation of benchmarks on item-level data using RFID","display_name":"Privacy-preserving computation of benchmarks on item-level data using RFID","publication_year":2010,"publication_date":"2010-03-22","ids":{"openalex":"https://openalex.org/W2053998779","doi":"https://doi.org/10.1145/1741866.1741884","mag":"2053998779"},"language":"en","primary_location":{"id":"doi:10.1145/1741866.1741884","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1741866.1741884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the third ACM conference on Wireless network security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/3438137","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063876732","display_name":"Nina Oertel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nina Oertel","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026695205","display_name":"Leonardo Weiss Ferreira Chaves","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leonardo Weiss Ferreira Chaves","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102985450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.9615,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.95025789,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7702150344848633},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.7262828350067139},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.6736893653869629},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6361868977546692},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.5583930611610413},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5377732515335083},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5279929637908936},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5031937956809998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49829602241516113},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4953833818435669},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4600740373134613},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42428386211395264},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3629050552845001},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17402639985084534},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1589125394821167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7702150344848633},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.7262828350067139},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.6736893653869629},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6361868977546692},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5583930611610413},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5377732515335083},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5279929637908936},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5031937956809998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49829602241516113},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4953833818435669},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4600740373134613},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42428386211395264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3629050552845001},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17402639985084534},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1589125394821167},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1741866.1741884","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1741866.1741884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the third ACM conference on Wireless network security","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:3438137","is_oa":true,"landing_page_url":"https://zenodo.org/record/3438137","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:3438137","is_oa":true,"landing_page_url":"https://zenodo.org/record/3438137","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W566241438","https://openalex.org/W1494138594","https://openalex.org/W1526979127","https://openalex.org/W1556475581","https://openalex.org/W1595357546","https://openalex.org/W1827368922","https://openalex.org/W1982146060","https://openalex.org/W1984680759","https://openalex.org/W2006453614","https://openalex.org/W2009726262","https://openalex.org/W2021918757","https://openalex.org/W2027471022","https://openalex.org/W2040168265","https://openalex.org/W2083796634","https://openalex.org/W2092422002","https://openalex.org/W2097462050","https://openalex.org/W2132172731","https://openalex.org/W2148757108","https://openalex.org/W2164409696","https://openalex.org/W4233019648"],"related_works":["https://openalex.org/W2358804928","https://openalex.org/W4225710828","https://openalex.org/W1998528887","https://openalex.org/W2965538880","https://openalex.org/W1601893083","https://openalex.org/W2528370785","https://openalex.org/W4200335562","https://openalex.org/W2861933770","https://openalex.org/W2361145238","https://openalex.org/W3112482351"],"abstract_inverted_index":{"Currently,":[0],"companies":[1,37],"are":[2,38],"about":[3],"to":[4,40],"optimize":[5],"their":[6],"internal":[7],"processes":[8],"by":[9],"monitoring":[10],"items":[11],"they":[12],"handle":[13],"with":[14,33,55],"Radio":[15],"Frequency":[16],"Identification":[17],"(RFID).":[18],"However,":[19,59],"there":[20],"is":[21,27],"a":[22,69],"risk":[23],"that":[24],"sensitive":[25,135],"information":[26],"disclosed":[28],"when":[29],"sharing":[30,54],"RFID":[31,42,81,116],"data":[32,53,82],"other":[34],"companies.":[35],"Therefore,":[36],"unwilling":[39],"share":[41],"data.":[43],"At":[44],"first":[45],"glance,":[46],"Secure":[47],"Multi-Party":[48],"Computation":[49],"(SMC)":[50],"might":[51],"reconciliate":[52],"the":[56,62,126],"privacy":[57],"concerns.":[58],"SMC":[60,74],"requires":[61],"collaboration":[63],"of":[64],"all":[65],"parties":[66,89],"involved":[67],"in":[68,84],"protocol.":[70],"This":[71,123],"prevents":[72],"using":[73,107,129],"for":[75,100],"many":[76],"applications":[77],"based":[78],"on":[79,115],"item-level":[80,105,131],"collected":[83],"supply":[85,127],"chains,":[86],"since":[87],"some":[88],"may":[90],"be":[91],"competitors":[92],"or":[93],"have":[94],"conflicting":[95],"interests.":[96],"We":[97],"present":[98],"protocols":[99],"securely":[101],"and":[102,118],"privately":[103],"computing":[104],"metrics":[106,132],"only":[108],"existing":[109],"communication":[110],"links":[111],"(e.g.,":[112],"messages":[113],"stored":[114],"tags)":[117],"an":[119],"oblivious":[120],"third":[121],"party.":[122],"enables":[124],"optimizing":[125],"chain":[128],"novel":[130],"without":[133],"compromising":[134],"information.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
