Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
References
AIM Global, Why RFID chips can’t infect cats – or computers, March 20, 2006, http://www.usingrfid.com/news/read.asp?lc=c62028cx673zn&version=printable
Auto-ID Center, ‘860MHz–930MHz Class I Radio Frequency Identification Tag Radio Frequency & Logical Communication Interface Specification’, Candidate Recommendation, Version 1.0.1, Technical Report. See http://www.epcglobalinc.org/standards_technology/Secure/v1.0/UHF-class1.pdf.
Department of Computer Science, Vrije Universiteit Amsterdam, RFID Viruses and Worms, Amsterdam, March 2006. See http://www.rfidvirus.org/,.
German Federal Office for Information Security (BSI), Security Aspects and Prospective Applications of RFID Systems, Bonn, October 2004.
Engel, C., ‘Auf dem Weg zum elektronischen Personalausweis’, Datenschutz und Datensicherheit 4/2006, pp. 207-210, Wiesbaden 2006.
Finkenzeller, K., RFID-Handbuch, 4th edition, München, August 2006.
Finke, T., Kelter, H., Abhörmöglichkeiten der Kommunikation zwischen Lesegerät und Transponder am Beispiel eines ISO14443-Systems,
Garfinkel, S., Rosenberg, B., RFID, Applications, Security and Privacy. Addison Wesley, Boston 2006.
Hildebrandt, M., Meints (eds.), M., FIDIS deliverable D7.7: RFID, Profiling and AmI, Frankfurt a.M. 2006. Available via http://www.fidis.net/fidis-del/period-3-20062007/#c1095
Hogewerf, P., van ‘t Klooster, K., ISO 11784/11785 a Brief Historical Overview, http://www.wsava.org/MicrochipComm2.htm
Institute of Computer Science and Social Studies (IC), Department of Telematics, Albert-Ludwig University Freiburg, Germany: Electronic Commerce Enquête, http://www.telematik.uni-freiburg.de/ece.php, 2005 (last accessed at August 8th, 2006).
International Civil Aviation Organization (ICAO), ‘Document 9303’ and ‘Standards for ePassports’, Montreal 2004. Available via http://www.icao.int/mrtd/Home/Index.cfm
ISO/IEC standard 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms, 1999.
Juels, A., Rivest, R., Szydlo, M., ‘The blocker tag: selective blocking of RFID tags for consumer privacy’, CCS’03, October 2003, Washington.
Juels, A., ‘RFID Security and Privacy: a Research Survey’, IEEE Journal on Selected Areas in Communication 24, No. 2, pp. 381- 394, 2006. Available via http://www.rsa.com/rsalabs/staff/bios/ajuels/publications/pdfs/rfid_survey_28_09_05.pdf
Kfir, Z., Wool, A., ‘Picking virtual pockets using relay attacks on contactless smartcard systems.’, Cryptology ePrint Archive, Report, Tel Aviv University 2005.
Meints, M., Hansen, M. (eds.), FIDIS deliverable D3.6: Study on ID Documents, Frankfurt a.M. 2006. Available via http://www.fidis.net/fidis-del/period-2-20052006/#c1338
Official Journal of the European Union (EU): Legislation, L 123, Vol. 47, April 27th, 2004, see http://europa.eu.int/eur-lex/en/archive/2004/l_12320040427en.html (last accessed at August 8th, 2006).
Quack, K.: ‘Zwei-Klassen-Gesellschaft bei RFID’, Computerwoche.de, 16.06.2005, http://www.computerwoche.de/index.cfm?pageid=306&type=detail&artif=76851&category=353
Rieback, M., Tag-borne attacks against RFID middleware, Presentation in SAFE-NL workshop, 8 June 2006, Delft, The Netherlands.
Robroch, H., ePassport Privacy Attack, http://www.riscure.com/2_news/200604%
20CardsAsiaSing%20ePassport%20Privacy.pdf
Sackmann, S., Strüker, J.: Electronic Commerce Enquete 2005 - 10 Jahre Electronic Commerce: Eine stille Revolution in deutschen Unternehmen. Institut für Informatik und Gesellschaft, Telematik, Freiburg i.Br., Germany, 2005.
Steel, D., ‘Smart Dust’, University of Houston ISRC Technology Report, Houston, March 2005. Available at http://www.uhisrc.com/FTB/Smart%20Dust/Smart%20Dust.pdf (accessed on 22nd of August 2006)
Strobl, J., Roth, C., (Eds.), GIS und Sicherheitsmanagement, pp. 91-100, Wiechmann, Heidelberg, 2006. Available at http://ifgi.uni-muenster.de/~raubal/Publications/RevBookSections/Tomberge&Raubal_Navigation%20mit%20RFID_AGIT_final.pdf
|
|
|
Denis Royer | 41 / 46 |