{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:39:50Z","timestamp":1772059190796,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030112","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"210-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":386,"title":["Privacy and security in library RFID"],"prefix":"10.1145","author":[{"given":"David","family":"Molnar","sequence":"first","affiliation":[{"name":"University of California at Berkeley"}]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of California at Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"January","author":"M.","year":"2004","unstructured":"3 M. eTattler newsletter , January 2004 . http:\/\/cms. 3m.com\/cms\/US\/en\/0-257\/kkruuFX\/viewimage.jhtml.]] 3M. eTattler newsletter, January 2004. http:\/\/cms. 3m.com\/cms\/US\/en\/0-257\/kkruuFX\/viewimage.jhtml.]]"},{"key":"e_1_3_2_1_2_1","first-page":"317","volume-title":"Software Security Theories and Systems. Mext-NSF-JSPS International Symposium (ISSS'02)","author":"Abadi Martin","year":"2003","unstructured":"Martin Abadi and Cedric Fournet . Hiding names : Private authentication in the applied pi calculus . In Software Security Theories and Systems. Mext-NSF-JSPS International Symposium (ISSS'02) , pages 317 -- 338 . Springer-Verlag , 2003 .]] Martin Abadi and Cedric Fournet. Hiding names: Private authentication in the applied pi calculus. In Software Security Theories and Systems. Mext-NSF-JSPS International Symposium (ISSS'02), pages 317--338. Springer-Verlag, 2003.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Library RFID technology","author":"Boss Richard","year":"2003","unstructured":"Richard Boss . Library RFID technology . Library Technology Reports , Nov\/Dec 2003 .]] Richard Boss. Library RFID technology. Library Technology Reports, Nov\/Dec 2003.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"October","author":"Chachra Vinod","year":"2003","unstructured":"Vinod Chachra and Daniel McPherson . Personal privacy and use of RFID technology in libraries , October 2003 . http:\/\/www.vtls.com\/documents\/privacy.pdf.]] Vinod Chachra and Daniel McPherson. Personal privacy and use of RFID technology in libraries, October 2003. http:\/\/www.vtls.com\/documents\/privacy.pdf.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"EPC 868-915Mhz tag Class 1 candidate recommendation","author":"EPCGlobal Consortium","year":"2004","unstructured":"EPCGlobal Consortium . EPC 868-915Mhz tag Class 1 candidate recommendation , 2004 . http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/UHF-class1%.pdf.]] EPCGlobal Consortium. EPC 868-915Mhz tag Class 1 candidate recommendation, 2004. http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/UHF-class1%.pdf.]]"},{"key":"e_1_3_2_1_6_1","volume-title":"EPC 900Mhz tag Class 0 standard","author":"EPCGlobal Consortium","year":"2004","unstructured":"EPCGlobal Consortium . EPC 900Mhz tag Class 0 standard , 2004 . http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/UHF-class0%.pdf.]] EPCGlobal Consortium. EPC 900Mhz tag Class 0 standard, 2004. http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/UHF-class0%.pdf.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"EPC ISM Band 13.56MHz Class 1 candidate recommendation","author":"EPCGlobal Consortium","year":"2004","unstructured":"EPCGlobal Consortium . EPC ISM Band 13.56MHz Class 1 candidate recommendation , 2004 . http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/HF-Class1.%pdf.]] EPCGlobal Consortium. EPC ISM Band 13.56MHz Class 1 candidate recommendation, 2004. http:\/\/www.epcglobalinc.org\/standards_technology\/Secure\/v1.0\/HF-Class1.%pdf.]]"},{"key":"e_1_3_2_1_8_1","volume-title":"FBI intelligence memo no","author":"FBI Counterterrorism Division","year":"2002","unstructured":"FBI Counterterrorism Division . FBI intelligence memo no . 102, December 2002 . http:\/\/cryptome.quintessenz.org\/mirror\/fbi-almanacs.htm.]] FBI Counterterrorism Division. FBI intelligence memo no. 102, December 2002. http:\/\/cryptome.quintessenz.org\/mirror\/fbi-almanacs.htm.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Libraries and the USA PATRIOT act","author":"Doyle Charles","year":"2003","unstructured":"Charles Doyle . Libraries and the USA PATRIOT act , 2003 .]] Charles Doyle. Libraries and the USA PATRIOT act, 2003.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"ICode SLI data sheet","author":"Electronics Phillips","year":"2004","unstructured":"Phillips Electronics . ICode SLI data sheet , 2004 . http:\/\/www.semiconductors.philips.com\/acrobat\/other\/identification\/sl2i%cs20-fact-sheet.pdf.]] Phillips Electronics. ICode SLI data sheet, 2004. http:\/\/www.semiconductors.philips.com\/acrobat\/other\/identification\/sl2i%cs20-fact-sheet.pdf.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook","author":"Finkenzeller Klaus","year":"2003","unstructured":"Klaus Finkenzeller . RFID Handbook . John Wiley and Sons , 2003 .]] Klaus Finkenzeller. RFID Handbook. John Wiley and Sons, 2003.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"MIT RFID Privacy Workshop","author":"Fishkin Kenneth","year":"2003","unstructured":"Kenneth Fishkin and Sumit Roy . Enhancing RFID privacy through antenna energy analysis . In MIT RFID Privacy Workshop , 2003 . http:\/\/www.rfidprivacy.org\/papers\/fishkin.pdf.]] Kenneth Fishkin and Sumit Roy. Enhancing RFID privacy through antenna energy analysis. In MIT RFID Privacy Workshop, 2003. http:\/\/www.rfidprivacy.org\/papers\/fishkin.pdf.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy in Ubiquitous Computing Workshop, 2002","author":"Garnkel Simson","year":"2000","unstructured":"Simson Garnkel . Adapting fair information practices to low cost RFID systems . In Privacy in Ubiquitous Computing Workshop, 2002 . http:\/\/www.simson.net\/clips\/academic\/ 2000 _Ubicomp_RFID.pdf.]] Simson Garnkel. Adapting fair information practices to low cost RFID systems. In Privacy in Ubiquitous Computing Workshop, 2002. http:\/\/www.simson.net\/clips\/academic\/2000_Ubicomp_RFID.pdf.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Personal communication","author":"Gentry Craig","year":"2004","unstructured":"Craig Gentry and Zulkar Ramzan . Personal communication , 2004 .]] Craig Gentry and Zulkar Ramzan. Personal communication, 2004.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"Lukas Grunwalds. Rf-dump 2004.]]  Lukas Grunwalds. Rf-dump 2004.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Internet key exchange rfc 2409","author":"Harkins D.","year":"1998","unstructured":"D. Harkins and D. Carrel . Internet key exchange rfc 2409 , 1998 . http:\/\/www.faqs.org\/rfcs\/rfc2409.html.]] D. Harkins and D. Carrel. Internet key exchange rfc 2409, 1998. http:\/\/www.faqs.org\/rfcs\/rfc2409.html.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"RFID Privacy Workshop, MIT","author":"Inoue Sozo","year":"2003","unstructured":"Sozo Inoue and Hiroto Yasuura . RFID privacy using user-controllable uniqueness . In RFID Privacy Workshop, MIT , 2003 . http: \/\/www.rfidprivacy.org\/papers\/sozo_inoue.pdf.]] Sozo Inoue and Hiroto Yasuura. RFID privacy using user-controllable uniqueness. In RFID Privacy Workshop, MIT, 2003. http: \/\/www.rfidprivacy.org\/papers\/sozo_inoue.pdf.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Information technology AIDC techniques - RFID for item management Part 3: - Parameters for air interface communications at 13.56 MHz","author":"IEC JTC","year":"2004","unstructured":"ISO\/ IEC JTC 1\/SC 31\/WG 4. Information technology AIDC techniques - RFID for item management Part 3: - Parameters for air interface communications at 13.56 MHz , 2004 . Version N 681R.]] ISO\/IEC JTC 1\/SC 31\/WG 4. Information technology AIDC techniques - RFID for item management Part 3: - Parameters for air interface communications at 13.56 MHz, 2004. Version N681R.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030112"}},"subtitle":["issues, practices, and architectures"],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":18,"alternative-id":["10.1145\/1030083.1030112","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030112","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}