User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to control when a tag responds to queries by leveraging a mobile phone. The design and implementation of this approach is presented along with a study of its usability. 							
						
							
					 															
					Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris