RFID Handbook: Applications, Technology, Security, and Privacy
Author: Syed A. Ahson, Mohammad Ilyas
Publisher: CRC Press
Number Of Pages: 712
Publication Date:
2008-03-17
ISBN-10 / ASIN: 1420054996
ISBN-13 / EAN: 9781420054996
Format:
PDF,16.3MB
Contents:
Section I Introduction
1. Physics and Geometry of RFID... 3
Marlin H. Mickle, Leonid Mats, and Peter J. Hawrylak
2. EPCglobal Network .. 17
Alfio R. Grasso
3. Design Automation for RFID Tags and Systems .. 35
Swapna Dontharaju, Shenchih Tung, Raymond R. Hoare, James T. Cain,
Marlin H. Mickle, and Alex K. Jones
4. Far-Field Tag Antenna Design Methodology .. 65
Damith C. Ranasinghe and Peter H. Cole
5. Contemporary RFID Reader Architecture.. 93
Behnam Jamali and Peter H. Cole
6. Progress in RFID Education .... 109
Brian J. Garner
Section II Technology
7. RFID Reader Synchronization 125
Kin Seong Leong, Mun Leng Ng, Alfio R. Grasso, and Peter H. Cole
8. Adaptive Tag Anticollision Protocols for RFID Passive Tags ... 139
Jihoon Myung, Wonjun Lee, and Timothy K. Shihv
9. Comparative Performance Analysis of Anticollision Protocols in RFID Networks.... 161
Wonjun Lee, Jihoon Choi, and Donghwan Lee
10. Maximizing Read Accuracy by Optimally Locating RFID Interrogators . 181
Lin Wang, Bryan A. Norman, and Jayant Rajgopal
11. Minimum Energy=Power Considerations 199
Alex K. Jones, Gerold Joseph Dhanabalan, Swapna Dontharaju,Shenchih Tung, Peter J. Hawrylak, Leonid Mats, Marlin H. Mickle,
and James T. Cain
12. Electomagnetic Coupling in RFID 231
Peter H. Cole and Damith C. Ranasinghe
13. RFID Tags for Metallic Object Identification 249
Mun Leng Ng, Kin Seong Leong, and Peter H. Cole
14. WISP: A Passively Powered UHF RFID Tag with Sensing and Computation .... 261
Daniel J. Yeager, Alanson P. Sample, and Joshua R. Smith
Section III Applications
15. From Automatic Identification and Data Capture to "Smart Business Process": Preparing for a Pilot Integrating RFID .... 279
Samuel Fosso Wamba, Élisabeth Lefebvre, Ygal Bendavid,and Louis-A. Lefebvre
16. Technological Requirements and Derived Benefits from RFID Enabled Receiving in a Supply Chain.... 295
Harold Boeck, Louis-A. Lefebvre, and Élisabeth Lefebvre
17. A Prototype on RFID and Sensor Networks for Elder Health Care ...311
Melody Moh, Loc Ho, Zachary Walker, and Teng-Sheng Moh
18. Triage with RFID Tags for Massive Incidents .... 329
Sozo Inoue, Akihito Sonoda, and Hiroto Yasuura
19. RFID Tagging and the Design of "Place" ..... 351
Anijo Punnen Mathew
20. Photosensing Wireless Tags for Precise Location and Geometry Queries ...369
Ramesh Raskar, Paul Beardsley, Paul Dietz, and Jeroen van Baarvi
21. RFID and NFC on Mobile Phones 375
Paul Coulton, Omer Rashid, and Reuben Edwards
22. Applying RFID Techniques for the Next-Generation Automotive Services .... 391
Peter Harliman, Joon Goo Lee, Kyong Jin Jo, and Seon Wook Kim
23. Application of RFID Technologies for Communication Robots ..... 417
Masahiro Shiomi, Takayuki Kanda, Hiroshi Ishiguro, and Norihiro Hagita
24. Browsing the World with RFID Tags: Design and Implementation of an RFID-Based Distributed Environmental Memory 435
Alberto Rosi, Marco Mamei, and Franco Zambonelli
25. RFID-Enabled Privacy-Preserving Video Surveillance: A Case Study... 455
Jehan Wickramasuriya, Sharad Mehrotra, and Nalini Venkatasubramanian
Section IV Security and Privacy
26. Is RFID Technology Secure and Private?...469
Surinder Mohan Bhaskar
27. Privacy and Personal Information Protection in RFID Systems ..... 485
Yasunobu Nohara, Kensuke Baba, Sozo Inoue, and Hiroto Yasuura
28. Multilateral Approaches for Reliable Mobile RFID Service Systems.. 499
Namje Park and Dongho Won
29. ONS Security .... 523
Benjamin Fabian, Oliver Günther, and Sarah Spiekermann
30. Practical Steps for Securing RFID Systems ... 533
A. Karygiannis, Bernie Eydt, and Ted S. Phillips
31. Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography 573
Damith C. Ranasinghe, Raja Ghosal, Alfio R. Grasso, and Peter H. Cole
32. Low Overhead RFID Security . 589
Shlomi Dolev, Marina Kopeetsky, Thomas Clouser, and Mikhail Nesterenko
33. Layers of Security for Active RFID Tags . 603
Shenchih Tung, Swapna Dontharaju, Leonid Mats, Peter J. Hawrylak,
James T. Cain, Marlin H. Mickle, and Alex K. Jones
34. Cryptographic Approaches to RFID Security and Privacy... 631
Koutarou Suzuki, Miyako Ohkubo, and Shingo Kinoshitavii
35. RFID Authentication: Reconciling Anonymity and Availability .... 643
Breno de Medeiros and Mike Burmester
36. Security and Privacy of RFID for Biomedical Applications:A Survey 657
Ellen Stuart, Melody Moh, and Teng-Sheng Moh
这本书是不是人见人爱啊?我花了好多时间和精力才弄到的。呵呵。
[
本帖最后由 qche111 于 2008-5-26 03:33 PM 编辑 ]
RFID Handbook: ARFID Handbook: Applications, Technology, Security, and Privacy(0pplications, Technology, Security, and Privacy(0
楼主大人辛苦了。我也先来看看 啊..........
xuxi...........................................
感谢版主,辛苦了....呵呵,拿走了 .....
lou zhu li hai ya.
thank you very much.
:45bb :48bb ...................
:45bb :48bb ...................
RFID Handbook: ARFID Handbook: Applications, Technology, Security, and Privacy(0pplications, Technology, Security, and Privacy
RFID Handbook: ARFID Handbook: Applications, Technology, Security, and Privacy(0pplications, Technology, Security, and Privacy(0