{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:06:47Z","timestamp":1742389607977},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_2","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"2-21","source":"Crossref","is-referenced-by-count":11,"title":["Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model"],"prefix":"10.1007","author":[{"given":"Nitesh","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Voris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In: Security, Privacy and Trust in Pervasive and Ubiquitous Computing (2006)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Buettner, M., Prasad, R., Philipose, M., Wetherall, D.: Recognizing Daily Activities with RFID-Based Sensors. In: International Conference on Ubiquitous Computing (UbiComp) (2009)","DOI":"10.1145\/1620545.1620553"},{"key":"2_CR3","unstructured":"Corporation, S.: SMARTCODE Solves the Privacy Issue Relating to Potential Unauthorized Reading of RFID Enabled Passports and ID Cards (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Koscher, K., Smith, J., Kohno, T.: RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. In: ACM Conference on Computer and Communications Security (2008)","DOI":"10.1145\/1455770.1455831"},{"key":"2_CR5","unstructured":"Electronics, M.: MMA7660FCR1 Freescale Semiconductor Board Mount Accelerometers (2009)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Hancke, G.: Practical Attacks on Proximity Identification Systems (Short Paper). In: IEEE Symposium on Security and Privacy, S&P (2006)","DOI":"10.1109\/SP.2006.30"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Holleman, J., Yeager, D., Prasad, R., Smith, J., Otis, B.: NeuralWISP: An Energy-Harvesting Wireless Neural Interface with 1-m Range. IEEE Transactions on Biomedical Circuits and Systems, BioCAS (2008)","DOI":"10.1109\/BIOCAS.2008.4696868"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, B., Roy, S., Sundara-Rajan, K., Philipose, M., Smith, J., Mamishev, A.: Energy Scavenging for Inductively Coupled Passive RFID Systems. IEEE Instrumentation and Measurement Technology Conference (2005)","DOI":"10.1109\/IMTC.2005.1604285"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, B., Smith, J., Philipose, M., Roy, S., Sundara-Rajan, K., Mamishev, A.: Energy scavenging for inductively coupled passive RFID systems. IEEE Transactions on Instrumentation and Measurement (2007)","DOI":"10.1109\/TIM.2006.887407"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications (2006)","DOI":"10.1109\/JSAC.2005.861395"},{"key":"2_CR12","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports. Security and Privacy for Emerging Areas in Communications Networks, Securecomm (2005)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of rfid tags for consumer privacy. In: ACM Conference on Computer and Communications Security, CCS (2003)","DOI":"10.1145\/948109.948126"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11767831_14","volume-title":"Privacy Enhancing Technologies","author":"A. Juels","year":"2006","unstructured":"Juels, A., Syverson, P.F., Bailey, D.V.: High-power proxies for enhancing rfid privacy and utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 210\u2013226. Springer, Heidelberg (2006)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11761679_6","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J. Katz","year":"2006","unstructured":"Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 73\u201387. Springer, Heidelberg (2006)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. In: Security and Privacy for Emerging Areas in Communications Networks, Securecomm (2005)","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"2_CR18","unstructured":"Lester, T.S.J., Hartung, C., Agarwal, S., Kohno, T.: Devices That tell on You: Privacy Trends in Consumer Ubiquitous Computing. In: USENIX Security Symposium (2007)"},{"key":"2_CR19","unstructured":"O\u2019Connor, M.: RFID Cures Concrete (2006)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information Security and Privacy","author":"M.R. Rieback","year":"2005","unstructured":"Rieback, M.R., Crispo, B., Tanenbaum, A.S.: Rfid guardian: A battery-powered mobile device for rfid privacy management. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 184\u2013194. Springer, Heidelberg (2005)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Sample, A., Yeager, D., Powledge, P., Smith, J.: Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems. In: IEEE International Conference on RFID (2007)","DOI":"10.1109\/RFID.2007.346163"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Sample, A., Yeager, D., Smith, J.: A capacitive touch interface for passive RFID tags. In: Proceedings of the 2009 IEEE RFID Conference (2009)","DOI":"10.1109\/RFID.2009.4911212"},{"key":"2_CR23","unstructured":"Segawa, N.: Behavior Evaluation of Sika Deer (Cervus Nippon) by RFID System. In: WISP Summit (2009)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/11853565_29","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"J. Smith","year":"2006","unstructured":"Smith, J., Sample, A., Powledge, P., Mamishev, A., Roy, S.: A Wirelessly-Powered Platform for Sensing and Computation. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol.\u00a04206, pp. 495\u2013506. Springer, Heidelberg (2006)"},{"key":"2_CR25","unstructured":"Sutter, J.: CNN Article: Wallet of the future? Your mobile phone(2009), http:\/\/www.cnn.com\/2009\/TECH\/08\/13\/cell.phone.wallet\/index.html?eref=igoogle_cnn"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:49:13Z","timestamp":1606186153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}