{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:27:03Z","timestamp":1774456023084,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Basic Research Program of China","award":["2015CB351705"],"award-info":[{"award-number":["2015CB351705"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1750704"],"award-info":[{"award-number":["CNS-1750704"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1717948"],"award-info":[{"award-number":["CNS-1717948"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science and Technology Major Project","award":["JZ- 20150910"],"award-info":[{"award-number":["JZ- 20150910"]}]},{"name":"NSFC","award":["61572396 61751211 61772413"],"award-info":[{"award-number":["61572396 61751211 61772413"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3241539.3241541","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:04:36Z","timestamp":1539695076000},"page":"385-399","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Towards Replay-resilient RFID Authentication"],"prefix":"10.1145","author":[{"given":"Ge","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University &amp; University of California, Santa Cruz, Xi'an, China"}]},{"given":"Haofan","family":"Cai","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Chen","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; ZJU-Alibaba Joint Cyber Security and Privacy Research Laboratory, Hangzhou, China"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Han","family":"Ding","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fadel Adib Zachary Kabelac and Dina Katabi. 2015. Multi-person localization via RF body reflections Proceedings of USENIX NSDI.   Fadel Adib Zachary Kabelac and Dina Katabi. 2015. Multi-person localization via RF body reflections Proceedings of USENIX NSDI."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2011.5764613"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Xiaosheng Chen Feng Lu and T Ye Terry. 2010. The \u201cweak spots\" in stacked UHF RFID tags in NFC applications Proceedings of IEEE RFID.  Xiaosheng Chen Feng Lu and T Ye Terry. 2010. The \u201cweak spots\" in stacked UHF RFID tags in NFC applications Proceedings of IEEE RFID.","DOI":"10.1109\/RFID.2010.5467262"},{"key":"e_1_3_2_1_4_1","volume-title":"Physical-layer Identification of RFID Devices. In Usenix Security Symposium. 199--214","author":"Danev Boris","year":"2009","unstructured":"Boris Danev , Thomas S Heydt-Benjamin , and Srdjan Capkun . 2009 . Physical-layer Identification of RFID Devices. In Usenix Security Symposium. 199--214 . Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. 2009. Physical-layer Identification of RFID Devices. In Usenix Security Symposium. 199--214."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_1_8_1","volume-title":"Human object estimation via backscattered radio frequency signal Proceedings of IEEE INFOCOM","author":"Ding Han","unstructured":"Han Ding , Jinsong Han , Alex X. Liu , Jizhong Zhao , Panlong Yang , Wei Xi , and Zhiping Jiang . 2015. Human object estimation via backscattered radio frequency signal Proceedings of IEEE INFOCOM . Han Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, and Zhiping Jiang. 2015. Human object estimation via backscattered radio frequency signal Proceedings of IEEE INFOCOM."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486424"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_2"},{"key":"e_1_3_2_1_11_1","unstructured":"EPCglobal. 2005. $EPC^\u2122$ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz--960 MHz.  EPCglobal. 2005. $EPC^\u2122$ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz--960 MHz."},{"key":"e_1_3_2_1_12_1","volume-title":"Workshop Record. 236--246","author":"Feldhofer Martin","year":"2007","unstructured":"Martin Feldhofer . 2007 . Comparison of low-power implementations of Trivium and Grain The State of the Art of Stream Ciphers , Workshop Record. 236--246 . Martin Feldhofer. 2007. Comparison of low-power implementations of Trivium and Grain The State of the Art of Stream Ciphers, Workshop Record. 236--246."},{"key":"e_1_3_2_1_13_1","volume-title":"ISCAS 2007. IEEE International Symposium on. IEEE","author":"Feldhofer Martin","year":"2007","unstructured":"Martin Feldhofer and Johannes Wolkerstorfer . 2007 . Strong crypto for RFID tags-a comparison of low-power hardware implementations Circuits and Systems, 2007 . ISCAS 2007. IEEE International Symposium on. IEEE , 1839--1842. Martin Feldhofer and Johannes Wolkerstorfer. 2007. Strong crypto for RFID tags-a comparison of low-power hardware implementations Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. IEEE, 1839--1842."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2429657"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2391300"},{"key":"e_1_3_2_1_16_1","unstructured":"Haitham Hassanieh Jue Wang Dina Katabi and Tadayoshi Kohno. 2015. Securing RFIDs by randomizing the modulation and channel Proceedings of USENIX NSDI.   Haitham Hassanieh Jue Wang Dina Katabi and Tadayoshi Kohno. 2015. Securing RFIDs by randomizing the modulation and channel Proceedings of USENIX NSDI."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2481999"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2475749"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.11.008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653668"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790126"},{"key":"e_1_3_2_1_22_1","volume-title":"Anchor-free backscatter positioning for RFID tags with high accuracy Proceedings of IEEE INFOCOM","author":"Liu Tianci","unstructured":"Tianci Liu , Lei Yang , Qiongzheng Lin , Yi Guo , and Yunhao Liu . 2014. Anchor-free backscatter positioning for RFID tags with high accuracy Proceedings of IEEE INFOCOM . Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, and Yunhao Liu. 2014. Anchor-free backscatter positioning for RFID tags with high accuracy Proceedings of IEEE INFOCOM."},{"key":"e_1_3_2_1_23_1","volume-title":"RFID Reader Detector and Tilt-Sensitive RFID Tag Proceedings of ACM CHI.","author":"Marquardt N.","unstructured":"N. Marquardt and A. Taylor . 2009 . RFID Reader Detector and Tilt-Sensitive RFID Tag Proceedings of ACM CHI. N. Marquardt and A. Taylor. 2009. RFID Reader Detector and Tilt-Sensitive RFID Tag Proceedings of ACM CHI."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790101"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.56"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"C. Qian H. Ngan Y. Liu and L. M. Ni. 2011. Cardinality Estimation for Large-scale RFID Systems. IEEE Transactions on Parallel and Distributed Systems (2011).   C. Qian H. Ngan Y. Liu and L. M. Ni. 2011. Cardinality Estimation for Large-scale RFID Systems. IEEE Transactions on Parallel and Distributed Systems (2011).","DOI":"10.1109\/TPDS.2011.36"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809710"},{"key":"e_1_3_2_1_28_1","volume-title":"et almbox","author":"Stoica Petre","year":"2005","unstructured":"Petre Stoica , Randolph L Moses , et almbox .. 2005 . Spectral analysis of signals. Vol. Vol. 1 . Pearson Prentice Hall Upper Saddle River , NJ. Petre Stoica, Randolph L Moses, et almbox.. 2005. Spectral analysis of signals. Vol. Vol. 1. Pearson Prentice Hall Upper Saddle River, NJ."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427833"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127882.3127887"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971692"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486029"},{"key":"e_1_3_2_1_33_1","volume-title":"Electromagnetic fields","author":"Wangsness Roald K","year":"1986","unstructured":"Roald K Wangsness . 1986. Electromagnetic fields . Wiley-VCH ( 1986 ), 608. Roald K Wangsness. 1986. Electromagnetic fields. Wiley-VCH (1986), 608."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032162.2032168"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.9"}],"event":{"name":"MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking","location":"New Delhi India","acronym":"MobiCom '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 24th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3241539.3241541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3241539.3241541","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3241539.3241541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:29Z","timestamp":1750268969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3241539.3241541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":36,"alternative-id":["10.1145\/3241539.3241541","10.1145\/3241539"],"URL":"https:\/\/doi.org\/10.1145\/3241539.3241541","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}