Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
Other applications
Since 1997 at the Berkley University Pister et al. carried out research with the target to develop self-contained, millimetre-scale sensing and wireless communication devices (so called motes) for massively distributed sensor networks. A number of wireless connected motes are called SmartDust. The working group suggested many different areas of use for SmartDust, many of the with a military or secret service background. State-of-the-art in SmartDust related research, development and application recently was summarised by Steel (2005).
RFID also can be used to mark a certain location. Location based services (LBS) basing on RFID typically use fixed passive tags to denote the location and mobile readers. RFID based LBS are used e.g. for educational purposes (Hildebrandt, Meints 2006, c.f. chapter 3.3) or fully autonomous warehouses, where RFID tags are fixed at the shelves and the readers are attached to vehicles moving the goods around.
In the context of the football world championship 2006 in Germany also LBS using mobile RFID tags, fixed readers and mobile phones have been suggested (Strobl, Roth 2006: 91). These services have not been implemented so far.
|
|
|
Denis Royer | 25 / 46 |