{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:25:47Z","timestamp":1769909147828,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796663","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"700-709","source":"Crossref","is-referenced-by-count":12,"title":["RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter"],"prefix":"10.1109","author":[{"given":"Jiawei","family":"Li","sequence":"first","affiliation":[{"name":"Arizona State University"}]},{"given":"Ang","family":"Li","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Dianqi","family":"Han","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"Indiana University&#x2013;Purdue University Indianapolis"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Securing RFIDs by randomizing the modulation and channel","author":"hassanieh","year":"2015","journal-title":"NSDI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155427"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486424"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_24"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.21"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6166-2_10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462233"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241541"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737419"},{"key":"ref12","article-title":"Eingerprint: Robust energy-related fingerprinting for passive rfid tags","author":"chen","year":"2020","journal-title":"NSDI"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3287044","article-title":"Butter-fly: Environment-independent physical-layer authentication for passive RFID","volume":"2","author":"han","year":"2018","journal-title":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.120713.130417"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2009.5162013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973759"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210328"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486346"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3161199"},{"key":"ref28","article-title":"EPC UHF Gen2 Air Interface Protocol","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117835"},{"key":"ref27","article-title":"3d backscatter localization for fine-grained robotics","author":"luo","year":"2019","journal-title":"NSDI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.723"},{"key":"ref6","first-page":"199","article-title":"Physical-layer identification of RFID devices","author":"danev","year":"2009","journal-title":"Usenix Security"},{"key":"ref29","article-title":"47 CFR &#x00A7; 15.231 - Periodic operation in the band 40.66-40.70 MHz and above 70 MHz","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218580"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.56"},{"key":"ref2","article-title":"Privacy-preserving RFID authentication based on cryptographical encoding","author":"li","year":"2012","journal-title":"IEEE INFOCOM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2391300"},{"key":"ref1","article-title":"MIFARE SAM AV3 for NTAG 5, ICODE DNA and UCODE DNA","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524575"},{"key":"ref22","article-title":"UBX 10-6000 MHz Rx\/Tx (160 MHz, X Series only)","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973761"},{"key":"ref24","article-title":"Ubx 10-6000 mhz rx\/tx (160 mhz, x series only)","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2475749"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117833"},{"key":"ref25","article-title":"MAX2871 23.5MHz to 6000MHz Fractional\/Integer-N Synthesizer\/VCO","year":"0"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796663.pdf?arnumber=9796663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:28Z","timestamp":1657569688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796663","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}