- 1. Preface
- 2. Foreword
- 3. Summary
- 4. Introduction
- 4.1. RFID as a key technology of pervasive computing
- 4.2. The goals, methodological approach and structure of the study
- 5. Basics of RFID technology
- 5.1. Features and versions of RFID systems
- 5.2. Features for distinguishing RFID systems
- 6. Classification of RFID systems
- 6.1. General
- 6.2. Classification of RFID systems according to their performance
- 6.3. Classification of RFID systemsaccording to their range
- 6.4. The classification of the Auto-ID Center
- 7. Threat situation and inventory of common security measures
- 7.1. Overview
- 7.2. Basic types of attack
- 7.3. Types of attack according to their purpose
- 7.4. Digression: Attack on the backend
- 7.5. Threat to the active party
- 7.6. Threat situation for the passive party
- 7.7. Security precautions
- 7.8. Evaluation of the threat situation and discussion ofthe security measures
- 7.9. Availability of the security measures
- 8. Areas of RFID Application
- 8.1. Overview of application areas
- 8.2. Identification of objects
- 8.3. Document authentication
- 8.4. Maintenance and repair, recall campaigns
- 8.5. Access and route control
- 8.6. Theft protection and stop-loss strategies
- 8.7. Environmental monitoring and sensor technology
- 8.8. Supply chain management: automation, controland process control and optimization
- 9. Factors facilitating or inhibiting the use of RFID
- 10. Development perspectives of RFID technology
- 10.1. Making the risks visible in the form of fictive cases
- 10.2. Expected developments by 2010
- 11. Abbreviations
- 12. Index page
- 13. Bibliography
Persistent link: https://www.econbiz.de/10005865803