{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:43:08Z","timestamp":1752550988148,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,10]],"date-time":"2010-04-10T00:00:00Z","timestamp":1270857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,10]]},"DOI":"10.1145\/1753326.1753674","type":"proceedings-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T18:13:40Z","timestamp":1271096020000},"page":"2307-2316","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Rethinking RFID"],"prefix":"10.1145","author":[{"given":"Nicolai","family":"Marquardt","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Alex S.","family":"Taylor","sequence":"additional","affiliation":[{"name":"Microsoft Research Cambridge, Cambridge, United Kingdom"}]},{"given":"Nicolas","family":"Villar","sequence":"additional","affiliation":[{"name":"Microsoft Research Cambridge, Cambridge, United Kingdom"}]},{"given":"Saul","family":"Greenberg","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,4,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420055009"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241934.1241940"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147748"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460468"},{"key":"e_1_3_2_2_6_1","unstructured":"Cavoukian Ann. Privacy by Design... Take the Challenge. Information and Privacy Commissioner of Ontario (Canada) http:\/\/www.ipc.on.ca\/images\/Resources\/PrivacybyDesignBook.pdf 2009.  Cavoukian Ann. Privacy by Design... Take the Challenge. Information and Privacy Commissioner of Ontario (Canada) http:\/\/www.ipc.on.ca\/images\/Resources\/PrivacybyDesignBook.pdf 2009."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-007-0010-1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455831"},{"key":"e_1_3_2_2_9_1","volume-title":"USA","author":"Das R.","year":"2009","unstructured":"Das , R. and Harrop , P . RFID Forecasts, Players and Opportunities 2009--2019. IDTechEx Inc. Report, www.idtechex.com, Cambridge, MA , USA , 2009 . Das, R. and Harrop, P. RFID Forecasts, Players and Opportunities 2009--2019. IDTechEx Inc. Report, www.idtechex.com, Cambridge, MA, USA, 2009."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082024"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_5"},{"key":"e_1_3_2_2_13_1","unstructured":"Garfinkel S. An RFID Bill of Rights. Technology Review http:\/\/www.technologyreview.com\/communications\/12953\/ 2002.  Garfinkel S. An RFID Bill of Rights. Technology Review http:\/\/www.technologyreview.com\/communications\/12953\/ 2002."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082023"},{"key":"e_1_3_2_2_16_1","volume-title":"Vulnerabilities in first--generation RFID--enabled credit cards. LNCS 4886","author":"Heydt-Benjamin T.S.","year":"2008","unstructured":"Heydt-Benjamin , T.S. , Bailey , D.V. , Fu , K. , Juels , A. , and O Hare , T. Vulnerabilities in first--generation RFID--enabled credit cards. LNCS 4886 , Springer ( 2008 ), 2. Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., and O Hare, T. Vulnerabilities in first--generation RFID--enabled credit cards. LNCS 4886, Springer (2008), 2."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102205"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc.","author":"King J.","year":"2008","unstructured":"King , J. and McDiarmid , A. Where's the beep? : security, privacy, and user misunderstandings of RFID . Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc. ( 2008 ), 1--8. King, J. and McDiarmid, A. Where's the beep?: security, privacy, and user misunderstandings of RFID. Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc. (2008), 1--8."},{"key":"e_1_3_2_2_20_1","unstructured":"Koscher K. Juels A. Kohno T. and Brajkovic V. EPC RFID Tags in Security Applications: Passport Cards Enhanced Drivers Licenses and Beyond. RSA Laboratories. In Submission. http:\/\/www.rsa.com\/rsalabs\/node.asp?id=3557 (2008).  Koscher K. Juels A. Kohno T. and Brajkovic V. EPC RFID Tags in Security Applications: Passport Cards Enhanced Drivers Licenses and Beyond. RSA Laboratories. In Submission. http:\/\/www.rsa.com\/rsalabs\/node.asp?id=3557 (2008)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741336"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0213-4"},{"key":"e_1_3_2_2_23_1","volume-title":"RFID Reader Detector and Tilt-Sensitive RFID Tags. DIY for CHI Workshop","author":"Marquardt N.","year":"2009","unstructured":"Marquardt , N. and Taylor , A.S . RFID Reader Detector and Tilt-Sensitive RFID Tags. DIY for CHI Workshop , ( 2009 ). Marquardt, N. and Taylor, A.S. RFID Reader Detector and Tilt-Sensitive RFID Tags. DIY for CHI Workshop, (2009)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517664.1517734"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082022"},{"key":"e_1_3_2_2_27_1","unstructured":"Ozer N.A. Rights \"Chipped\" Away: RFID and Identification Documents. Stanford Technology Law Review http:\/\/stlr. stanford.edu\/pdf\/ozer-rights-chipped-away.pdf 1 1 (2008).  Ozer N.A. Rights \"Chipped\" Away: RFID and Identification Documents. Stanford Technology Law Review http:\/\/stlr. stanford.edu\/pdf\/ozer-rights-chipped-away.pdf 1 1 (2008)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.7"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409662"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_16"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2007.346163"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2009.4911212"},{"key":"e_1_3_2_2_33_1","first-page":"2","volume":"4","author":"Schmidt A.","year":"2000","unstructured":"Schmidt , A. Implicit human computer interaction through context. Personal and Ubiq. Computing 4 , 2 ( 2000 ), 191--199. Schmidt, A. Implicit human computer interaction through context. Personal and Ubiq. Computing 4, 2 (2000), 191--199.","journal-title":"Personal and Ubiq. Computing"},{"key":"e_1_3_2_2_34_1","first-page":"6863220","author":"Selker E.J.","year":"2005","unstructured":"Selker , E.J. Manually Operated Switch for Enabling and Disabling an RFID card. US Patent 6863220 , ( 2005 ). Selker, E.J. Manually Operated Switch for Enabling and Disabling an RFID card. US Patent 6863220, (2005).","journal-title":"US Patent"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082018"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.31"},{"key":"e_1_3_2_2_37_1","first-page":"146","volume":"137","author":"Spiekermann S.","year":"2005","unstructured":"Spiekermann , S. and Berthold , O. Maintaining Privacy in RFID Enabled Environments . In Privacy , Security and Trust within the Context of Pervasive Computing . 2005 , 137 -- 146 . Spiekermann, S. and Berthold, O. Maintaining Privacy in RFID Enabled Environments. In Privacy, Security and Trust within the Context of Pervasive Computing. 2005, 137--146.","journal-title":"Security and Trust within the Context of Pervasive Computing"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297315"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035594.1035619"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303111"}],"event":{"name":"CHI '10: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Atlanta Georgia USA","acronym":"CHI '10"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1753326.1753674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:31Z","timestamp":1750250491000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753674"}},"subtitle":["awareness and control for interaction with RFID systems"],"short-title":[],"issued":{"date-parts":[[2010,4,10]]},"references-count":40,"alternative-id":["10.1145\/1753326.1753674","10.1145\/1753326"],"URL":"https:\/\/doi.org\/10.1145\/1753326.1753674","relation":{},"subject":[],"published":{"date-parts":[[2010,4,10]]},"assertion":[{"value":"2010-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}