{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:38:13Z","timestamp":1755999493502,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2971648.2971692","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"156-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Verifiable smart packaging with passive RFID"],"prefix":"10.1145","author":[{"given":"Ge","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Chen","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz"}]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China and Carnegie Mellon University"}]},{"given":"Wei","family":"Xi","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Han","family":"Ding","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Zhiping","family":"Jiang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1887\/0750306920"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2011.2164411"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240278"},{"volume-title":"EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz--960 MHz","year":"2008","author":"Gen E.","key":"e_1_3_2_1_6_1"},{"volume-title":"Probability and random processes","year":"1982","author":"Grimmett G.","key":"e_1_3_2_1_7_1"},{"volume-title":"Engineering electromagnetics","year":"2001","author":"Hayt W. H.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668344"},{"volume-title":"Proceedings of USENIX NSDI","year":"2014","author":"Kellogg B.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044029.06344.dd"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790101"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.56"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500436"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARRAY.2010.5613314"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2497611"},{"volume-title":"Radar Handbook","year":"1962","author":"Skolnik M. I.","key":"e_1_3_2_1_18_1"},{"volume-title":"Infrared spectroscopy","year":"2005","author":"Stuart B.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486029"},{"volume-title":"Proceedings of IEEE MTT","year":"2010","author":"Wang Y.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"volume-title":"Open RFID lab. Available: http:\/\/pdcc.ntu.edu.sg\/wands\/ORL","year":"2013","author":"Zheng Y.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566880"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2528\/PIER11080907"}],"event":{"name":"UbiComp '16: The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Heidelberg Germany","acronym":"UbiComp '16"},"container-title":["Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:14Z","timestamp":1750218614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":25,"alternative-id":["10.1145\/2971648.2971692","10.1145\/2971648"],"URL":"https:\/\/doi.org\/10.1145\/2971648.2971692","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}