{"id":"https://openalex.org/W1606566696","doi":"https://doi.org/10.3233/jcs-2011-0435","title":"User-aided reader revocation in PKI-based RFID systems*","display_name":"User-aided reader revocation in PKI-based RFID systems*","publication_year":2011,"publication_date":"2011-12-23","ids":{"openalex":"https://openalex.org/W1606566696","doi":"https://doi.org/10.3233/jcs-2011-0435","mag":"1606566696"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2011-0435","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2011-0435","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046944830","display_name":"Rishab Nithyanand","orcid":"https://orcid.org/0000-0002-1280-1353"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rishab Nithyanand","raw_affiliation_strings":["Stony Brook University, Stony Brook, New York, NY, USA. E-mail: rnithyanand@cs.stonybrook.edu"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, New York, NY, USA. E-mail: rnithyanand@cs.stonybrook.edu","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California, Irvine, CA, USA. E-mail: gts@ics.uci.edu"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, CA, USA. E-mail: gts@ics.uci.edu","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007398036","display_name":"Ersin Uzun","orcid":null},"institutions":[{"id":"https://openalex.org/I173498003","display_name":"Palo Alto Research Center","ror":"https://ror.org/0529fxt39","country_code":"US","type":"facility","lineage":["https://openalex.org/I173498003","https://openalex.org/I4210132870"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ersin Uzun","raw_affiliation_strings":["Palo Alto Research Center, Palo Alto, CA, USA. E-mail: ersin.uzun@parc.com"],"affiliations":[{"raw_affiliation_string":"Palo Alto Research Center, Palo Alto, CA, USA. E-mail: ersin.uzun@parc.com","institution_ids":["https://openalex.org/I173498003"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007398036"],"corresponding_institution_ids":["https://openalex.org/I173498003"],"apc_list":null,"apc_paid":null,"fwci":1.5128,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.83766732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"19","issue":"6","first_page":"1147","last_page":"1172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7976503968238831},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.7878110408782959},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7674693465232849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7220596671104431},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5722562074661255},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5255704522132874},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.522940993309021},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.496584951877594},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46747279167175293},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4388723373413086},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.13312801718711853},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.117764413356781},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09785524010658264}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7976503968238831},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.7878110408782959},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7674693465232849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7220596671104431},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5722562074661255},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5255704522132874},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.522940993309021},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.496584951877594},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46747279167175293},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4388723373413086},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13312801718711853},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.117764413356781},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09785524010658264},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2011-0435","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2011-0435","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W173573222","https://openalex.org/W1485497075","https://openalex.org/W1501957918","https://openalex.org/W1502896015","https://openalex.org/W1503813395","https://openalex.org/W1518712071","https://openalex.org/W1596662236","https://openalex.org/W1945788957","https://openalex.org/W1964253833","https://openalex.org/W1984580543","https://openalex.org/W1988458847","https://openalex.org/W2001619264","https://openalex.org/W2021409677","https://openalex.org/W2026275113","https://openalex.org/W2032191478","https://openalex.org/W2060028811","https://openalex.org/W2092281181","https://openalex.org/W2136340790","https://openalex.org/W2139234472","https://openalex.org/W2139274667","https://openalex.org/W2148165512","https://openalex.org/W2155978834","https://openalex.org/W2157921972","https://openalex.org/W2174425991","https://openalex.org/W2802985968","https://openalex.org/W3028885860"],"related_works":["https://openalex.org/W2103383146","https://openalex.org/W3118037924","https://openalex.org/W4287547098","https://openalex.org/W4240517174","https://openalex.org/W2763050151","https://openalex.org/W1915479549","https://openalex.org/W1606380665","https://openalex.org/W2994213367","https://openalex.org/W2001371286","https://openalex.org/W1955053247"],"abstract_inverted_index":{"Recent":[0],"emergence":[1],"of":[2,6,33,46,58,116,134,149,156,180],"RFID":[3,13,59,71,92,97,124,136],"tags":[4,72,137],"capable":[5],"performing":[7],"public":[8,27,90],"key":[9,28],"operations":[10],"motivates":[11],"new":[12],"applications,":[14],"including":[15],"electronic":[16],"travel":[17],"documents,":[18],"identification":[19],"cards":[20],"and":[21,55,80,102,120,160,168,177,186],"payment":[22,82,144],"instruments.":[23,83],"In":[24,38,109],"this":[25,39,110],"context,":[26],"certificates":[29],"form":[30],"the":[31,34,47,85,114,147,157,175],"cornerstone":[32],"overall":[35],"system":[36],"security.":[37],"paper":[40],",":[41],"we":[42,112],"argue":[43],"that":[44,68],"one":[45],"prominent":[48],"challenges":[49],"is":[50,63,87],"how":[51],"to":[52,89,162],"handle":[53],"revocation":[54,121],"expiration":[56,119],"checking":[57],"reader":[60,117],"certificates.":[61],"This":[62],"an":[64,130],"important":[65,131],"issue":[66],"considering":[67],"these":[69],"high-end":[70],"are":[73],"geared":[74],"for":[75],"applications":[76,145],"such":[77],"as":[78],"e-documents":[79],"contactless":[81],"Furthermore,":[84],"problem":[86,115],"unique":[88],"key-based":[91],"systems,":[93],"since":[94],"a":[95,150,164],"passive":[96],"tag":[98],"has":[99],"no":[100],"clock":[101],"thus":[103],"cannot":[104],"use":[105],"(time-based)":[106],"off-line":[107],"methods.":[108],"paper,":[111],"address":[113],"certificate":[118],"in":[122,139],"PKI-based":[123],"systems.":[125],"We":[126,153,173],"begin":[127],"by":[128],"observing":[129],"distinguishing":[132],"feature":[133],"personal":[135],"used":[138],"authentication,":[140],"access":[141],"control":[142],"or":[143],"\u2013":[146],"involvement":[148],"human":[151],"user.":[152],"take":[154],"advantage":[155],"user's":[158],"awareness":[159],"presence":[161],"construct":[163],"simple,":[165],"efficient,":[166],"secure":[167],"(most":[169],"importantly)":[170],"feasible":[171],"solution.":[172],"evaluate":[174],"usability":[176],"practical":[178],"security":[179],"our":[181],"solution":[182],"via":[183],"user":[184],"studies":[185],"discuss":[187],"its":[188],"feasibility.":[189]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
