Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
Index of Figures
Figure 1: A flow diagram representing the major basic combinations of RFID systems 10
Figure 2: Illustration showing the broad range of frequencies within the electromagnetic spectrum that RFID systems can utilise 11
Figure 3: An example of a passive RFID tag, shown next to a UK two pence piece (roughly the size of a two Euro coin) for scale 12
Figure 4: The two main components of the RFID system 13
Figure 5: A general RFID architecture 15
Figure 6: Distribution of enterprises belonging to a specific branch 28
Figure 7: Targets of enterprises using, testing or planning to use RFID 30
Figure 8: Hurdles regarding the investment in RFID technology (base 55-50) 32
Figure 9: Estimation of several statements regarding data protection: “By using RFID technology …” (basis 50-47) 35
Figure 10: Relationship between FIDIS studies planned so far in the context of RFID 42
|
|
|
Denis Royer | 45 / 46 |