How can the expected interactions between caller and implementation be guaranteed?
Robert F. Sproull, Jim Waldo From Communications of the ACM | March 2014
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009