Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. ix |
Editors | p. xv |
Contributors | p. xvii |
Introduction | |
Physics and Geometry of RFID | p. 3 |
EPCglobal Network | p. 17 |
Design Automation for RFID Tags and Systems | p. 35 |
Far-Field Tag Antenna Design Methodology | p. 65 |
Contemporary RFID Reader Architecture | p. 93 |
Progress in RFID Education | p. 109 |
Technology | |
RFID Reader Synchronization | p. 125 |
Adaptive Tag Anticollision Protocols for RFID Passive Tags | p. 139 |
Comparative Performance Analysis of Anticollision Protocols in RFID Networks | p. 161 |
Maximizing Read Accuracy by Optimally Locating RFID Interrogators | p. 181 |
Minimum Energy/Power Considerations | p. 199 |
Electomagnetic Coupling in RFID | p. 231 |
RFID Tags for Metallic Object Identification | p. 249 |
WISP: A Passively Powered UHF RFID Tag with Sensing and Computation | p. 261 |
Applications | |
From Automatic Identification and Data Capture to "Smart Business Process": Preparing for a Pilot Integrating RFID | p. 279 |
Technological Requirements and Derived Benefits from RFID Enabled Receiving in a Supply Chain | p. 295 |
A Prototype on RFID and Sensor Networks for Elder Health Care | p. 311 |
Triage with RFID Tags for Massive Incidents | p. 329 |
RFID Tagging and the Design of "Place" | p. 351 |
Photosensing Wireless Tags for Precise Location and Geometry Queries | p. 369 |
RFID and NFC on Mobile Phones | p. 375 |
Applying RFID Techniques for the Next-Generation Automotive Services | p. 391 |
Application of RFID Technologies for Communication Robots | p. 417 |
Browsing the World with RFID Tags: Design and Implementation of an RFID-Based Distributed Environmental Memory | p. 435 |
RFID-Enabled Privacy-Preserving Video Surveillance: A Case Study | p. 455 |
Security and Privacy | |
Is RFID Technology Secure and Private? | p. 469 |
Privacy and Personal Information Protection in RFID Systems | p. 485 |
Multilateral Approaches for Reliable Mobile RFID Service Systems | p. 499 |
ONS Security | p. 523 |
Practical Steps for Securing RFID Systems | p. 533 |
Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography | p. 573 |
Low Overhead RFID Security | p. 589 |
Layers of Security for Active RFID Tags | p. 603 |
Cryptographic Approaches to RFID Security and Privacy | p. 631 |
RFID Authentication: Reconciling Anonymity and Availability | p. 643 |
Security and Privacy of RFID for Biomedical Applications: A Survey | p. 657 |
Index | p. 675 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.