Brings together contributions from stakeholder community - from RFID suppliers to privacy advocates and beyond. This book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet.
RFID: Applications, Security, and Privacy
โ Scribed by Simson Garfinkel, Beth Rosenberg
- Publisher
- Addison-Wesley Professional
- Year
- 2005
- Tongue
- English
- Leaves
- 580
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
โRFID is the first important technology of the twenty-first century. Thatโs an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? This book is a valuable contribution to the ongoing effort to find the answers.โ โFrom the Foreword by Kevin Ashton, cofounder and former executive director, Auto-ID Center; vice president, ThingMagic Corporation
Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.
Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder communityโfrom RFID suppliers to privacy advocates and beyond. His contributors introduce todayโs leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutionsโtechnical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include
- How RFID and other wireless ID technologies work
- RFID applicationsโfrom gas stations and pharmacies to the twenty-first century battlefield
- RFID, privacy, and the lawโin the United States and around the world
- RFID, security, and industrial espionage
- How Bluetooth and Wi-Fi can track individuals, with or without their permission
- Technical solutions to wireless ID privacy concernsโtheir values and limitations
- Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
- The future of citizen activism on privacy issues
Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.
Includes contributions from
AIM Global, Inc. CASPIAN Center for Democracy and Technology EPCglobal, Inc. The Galecia Group Gemplus IDAT Consulting & Education Institute for the Future Matrics, Inc. MIT Computer Science & Artificial Intelligence Laboratory MIT Media Laboratory OATSystems Privacy Journal The Privacy Rights Clearinghouse The Procter & Gamble Company RSA Laboratories UCLA Department of Geography Wayne State University Law School
๐ SIMILAR VOLUMES
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worldโs largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its pote
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: โThere must exist better solutions. โ I c- cerned myself with the topic in my spare time. A
<p>As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amou
<p><p></p><p>This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018.</p><p>The 16 full papers and 5 short papers presented were carefully reviewed