{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142585,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047462","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"42-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Is RFID technology secure and private?"],"prefix":"10.1145","author":[{"given":"Rand A.","family":"Mahmood","sequence":"first","affiliation":[{"name":"New York Institution of Technology, Amman, Jordan"}]},{"given":"Wasim A.","family":"Al-Hamdani","sequence":"additional","affiliation":[{"name":"Kentucky State University, East Main, KY"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"unstructured":"\"Radio Frequency Identification\" 2010. SearchNetworking.com RFID can be retrieved from http:\/\/searchnetworking.techtarget.com\/sDefinition.290660.sid7_gci80598700.html - Bing  \"Radio Frequency Identification\" 2010. SearchNetworking.com RFID can be retrieved from http:\/\/searchnetworking.techtarget.com\/sDefinition.290660.sid7_gci80598700.html - Bing","key":"e_1_3_2_1_1_1"},{"unstructured":"The ABI research technology market intelligence 2010 can be retrieved from http:\/\/www.abiresearch.com  The ABI research technology market intelligence 2010 can be retrieved from http:\/\/www.abiresearch.com","key":"e_1_3_2_1_2_1"},{"unstructured":"The IDC Analyze the future 2010.can be retrieved from http:\/\/www.idc.com\/  The IDC Analyze the future 2010.can be retrieved from http:\/\/www.idc.com\/","key":"e_1_3_2_1_3_1"},{"unstructured":"Texas Instruments 2011.can be retrieved from http:\/\/en.wikipedia.org\/wiki\/Texas_Instruments  Texas Instruments 2011.can be retrieved from http:\/\/en.wikipedia.org\/wiki\/Texas_Instruments","key":"e_1_3_2_1_4_1"},{"unstructured":"Problems with RFID 2011. can be retrieved from http:\/\/www.slais.ubc.ca\/courses\/libr500\/04-05-wt2\/www\/T_Gnissios\/problems.htm  Problems with RFID 2011. can be retrieved from http:\/\/www.slais.ubc.ca\/courses\/libr500\/04-05-wt2\/www\/T_Gnissios\/problems.htm","key":"e_1_3_2_1_5_1"},{"unstructured":"E. Schuman \"2006Major RFID Hurdles Ahead\" can be retrieved from http:\/\/www.eweek.com\/article2\/0 1895 1990814 00.asp  E. Schuman \"2006Major RFID Hurdles Ahead\" can be retrieved from http:\/\/www.eweek.com\/article2\/0 1895 1990814 00.asp","key":"e_1_3_2_1_6_1"},{"unstructured":"RFID & Individual Privacy 2010.can be retrieved from http:\/\/www.netcaucus.org\/events\/2005\/rfid\/one-pagers\/cpsr-rfid2005.pdf  RFID & Individual Privacy 2010.can be retrieved from http:\/\/www.netcaucus.org\/events\/2005\/rfid\/one-pagers\/cpsr-rfid2005.pdf","key":"e_1_3_2_1_7_1"},{"unstructured":"S. Rogerson 2004. \"Police intelligence?\" can be retrieved from http:\/\/www.ccsr.cse.dmu.ac.uk\/resources\/general\/ethicol\/Ecv14no4.pdf  S. Rogerson 2004. \"Police intelligence?\" can be retrieved from http:\/\/www.ccsr.cse.dmu.ac.uk\/resources\/general\/ethicol\/Ecv14no4.pdf","key":"e_1_3_2_1_8_1"},{"unstructured":"E. Schuman 2006.\" Item-Level RFID Tags Cost More than Expected\" can be retrieved from http:\/\/www.eweek.com\/article2\/0 1895 1990814 00.asp  E. Schuman 2006.\" Item-Level RFID Tags Cost More than Expected\" can be retrieved from http:\/\/www.eweek.com\/article2\/0 1895 1990814 00.asp","key":"e_1_3_2_1_9_1"},{"unstructured":"S. E. Sarma S. A. Weis and D. W. Engels. 2010. \"RFID Systems and Security and Privacy Implications\" can be retrieved from http:\/\/www.springerlink.com\/content\/7mdkkqvgwva88qxq\/   S. E. Sarma S. A. Weis and D. W. Engels. 2010. \"RFID Systems and Security and Privacy Implications\" can be retrieved from http:\/\/www.springerlink.com\/content\/7mdkkqvgwva88qxq\/","key":"e_1_3_2_1_10_1"},{"unstructured":"M. T. Islam 2010. \"A Brief Survey on RFID Security and Privacy Issues\" can be retrieved from http:\/\/www.scribd.com\/doc\/44643060\/A-Brief-Survey-on-RFID-Security-and-Privacy-Issues  M. T. Islam 2010. \"A Brief Survey on RFID Security and Privacy Issues\" can be retrieved from http:\/\/www.scribd.com\/doc\/44643060\/A-Brief-Survey-on-RFID-Security-and-Privacy-Issues","key":"e_1_3_2_1_11_1"},{"unstructured":"C. Swedberg 2010. U. S. Tests E-Passports can be retrieved from http:\/\/www.rfidjournal.com\/article\/view\/1218  C. Swedberg 2010. U. S. Tests E-Passports can be retrieved from http:\/\/www.rfidjournal.com\/article\/view\/1218","key":"e_1_3_2_1_12_1"},{"unstructured":"A. Ramos etal 2009.\" Do RFID passports make us vulnerable to identity theft?\" can be retrieved from http:\/\/cnfolio.com\/public\/rfid_analysis_of_passports.pdf  A. Ramos et al. 2009.\" Do RFID passports make us vulnerable to identity theft?\" can be retrieved from http:\/\/cnfolio.com\/public\/rfid_analysis_of_passports.pdf","key":"e_1_3_2_1_13_1"},{"unstructured":"M. Meingast J. King D. K. Mulligan 2007. \"Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond\" can be retrieved from http:\/\/www.academypublisher.com\/jcm\/vol02\/no07\/jcm02073648.pdf  M. Meingast J. King D. K. Mulligan 2007. \"Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond\" can be retrieved from http:\/\/www.academypublisher.com\/jcm\/vol02\/no07\/jcm02073648.pdf","key":"e_1_3_2_1_14_1"},{"unstructured":"The speedpass. 2011. can be retrieved from https:\/\/www.speedpass.com\/forms\/frinHowItWorks.aspx?pPg\/howTech.htm&pgHeader\/how  The speedpass. 2011. can be retrieved from https:\/\/www.speedpass.com\/forms\/frinHowItWorks.aspx?pPg\/howTech.htm&pgHeader\/how","key":"e_1_3_2_1_15_1"},{"unstructured":"K. Traub etal 2005. \"The EPCglobal Architecture Framework\" can be retrieved from Available:http:\/\/www.gsl.org\/gsmp\/kc\/epcglobal\/architecture\/architecture_1_0-framework-20050701.pdf  K. Traub et al. 2005. \"The EPCglobal Architecture Framework\" can be retrieved from Available:http:\/\/www.gsl.org\/gsmp\/kc\/epcglobal\/architecture\/architecture_1_0-framework-20050701.pdf","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/s10796-009-9210-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/PERCOM.2006.32"},{"unstructured":"rfidvirus.org. 2011. \"SQL Virus Using Self-Referential Queries\" can be retrieved from http:\/\/www.rfidvirus.org\/exploits\/sql_self\/index.html  rfidvirus.org. 2011. \"SQL Virus Using Self-Referential Queries\" can be retrieved from http:\/\/www.rfidvirus.org\/exploits\/sql_self\/index.html","key":"e_1_3_2_1_19_1"},{"unstructured":"Wikipedia.org 2010. \"Man-in-the-middleattack\" can be retrieved from http:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack  Wikipedia.org 2010. \"Man-in-the-middleattack\" can be retrieved from http:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack","key":"e_1_3_2_1_20_1"},{"unstructured":"B. Schneier 2006. \"RFID Cards and Man-in-the-Middle Attacks\" can be retrieved from http:\/\/www.schneier.com\/blog\/archives\/2006\/04\/rfid_cards_and.html  B. Schneier 2006. \"RFID Cards and Man-in-the-Middle Attacks\" can be retrieved from http:\/\/www.schneier.com\/blog\/archives\/2006\/04\/rfid_cards_and.html","key":"e_1_3_2_1_21_1"},{"unstructured":"A. Ali 2003. \"Re-Use of Integrated Dictionary Components for C4ISR Architectures\" can be retrieved from http:\/\/www.dodccrp.org\/events\/8th_ICCRTS\/Pres\/track_4\/1_1430ali.pdf  A. Ali 2003. \"Re-Use of Integrated Dictionary Components for C4ISR Architectures\" can be retrieved from http:\/\/www.dodccrp.org\/events\/8th_ICCRTS\/Pres\/track_4\/1_1430ali.pdf","key":"e_1_3_2_1_22_1"},{"unstructured":"Speedpass 2010. can be retrieved from https:\/\/www.speedpass.com\/forms\/frmFaqs.aspx?pPg=faqStarted  Speedpass 2010. can be retrieved from https:\/\/www.speedpass.com\/forms\/frmFaqs.aspx?pPg=faqStarted","key":"e_1_3_2_1_23_1"},{"issue":"2","key":"e_1_3_2_1_24_1","first-page":"58","article-title":"RFID: The Next Generation Auto-ID Technology","volume":"52","author":"Rawal Amit","year":"2009","unstructured":"Amit Rawal , 2009 . \" RFID: The Next Generation Auto-ID Technology \" Microwave Journal Vol. 52 No. 2 Page 58 Amit Rawal, 2009. \"RFID: The Next Generation Auto-ID Technology\" Microwave Journal Vol. 52 No.2 Page 58","journal-title":"Microwave Journal"},{"unstructured":"O. Bang J. Choi D. Lee and H. Lee 2009. \"Efficient Novel Anti-collision Protocols for Passive RFID Tags\" Auto-ID Labs White Paper  O. Bang J. Choi D. Lee and H. Lee 2009. \"Efficient Novel Anti-collision Protocols for Passive RFID Tags\" Auto-ID Labs White Paper","key":"e_1_3_2_1_25_1"},{"unstructured":"F. Armenio et al. 2007 \"The EPCglobal Architecture Framework\" Final Version 1.2(pp.27)  F. Armenio et al. 2007 \"The EPCglobal Architecture Framework\" Final Version 1.2(pp.27)","key":"e_1_3_2_1_26_1"}],"event":{"sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"InfoSecCD '11","name":"InfoSecCD '11: Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":26,"alternative-id":["10.1145\/2047456.2047462","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047462","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}