International Business Management

Year: 2010
Volume: 4
Issue: 1
Page No. 28 - 34

Advantages and Risks of RFID in Business Applications

Authors : Vladimir Modrak, Peter Knuth and Jozef Novak-Marcinein

References

Adam, N.R., V. Atluri, R. Koslowski, R. Grossman, V.P. Janeja and J. Warner, 2006. Secure interoperation for effective data mining in border control and homeland security applications. Proceedings of the 2006 International Conference on Digital Government Research, May 21-24, San Diego, California, pp: 124-125.

Auto-ID Center, 2004. Technology Guide. Massachusetts Institute of Technology, Massachusetts, USA.

Baudin, M. and A. Rao, 2005. RFID applications in manufacturing. White Paper Draft, California, USA. http://www.mmt-inst.com/RFID%20applications%20in%20manufacturing%20_Draft%207_.pdf.

Berisso, K., 2007. RFID in the Extreme Cold Chain. Center for Automatic Identification, Ohio, USA., pp: 1-5.

Feldhofer, M., S. Dominikus and J. Wolkerstorfer, 2004. Strong authentication for RFID systems using the AES algorithm. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, Aug. 11-13, Springer, Heidelberg, pp: 357-370.

Finkenzeller, K., 2003. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd Edn., John Wiley and Sons Ltd., West Sussex PO19 8SQ, England, ISBN-10: 0470844027, pp: 446.

Hingley, M., S. Taylor and C. Ellis, 2007. Radio frequency identification tagging: Supplier attitudes to implementation in the grocery retail sector. Int. J. Retail Distribut. Manage., 35: 803-820.
Direct Link  |  

Holcomb, D.E., W.P. Burleson and K. Fu, 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. Proceedings of the Conference on RFID Security. Malaga, Spain, July 11-13.

Jacoby, D. and G. Lofthouse, 2006. RFID comes of Age. A Report Sponsored by The North of England Inward Investment Agency. Briefing Paper, The Economist Intelligence Unit. March 2006. http://www.rfidproductnews.com/whitepapers/files/RFID_Comes_Of_Age.pdf.

Juels, A., 2005. Minimalist Cryptography for Low-Cost RFID Tags. In: Security in Communication Networks, Blundo, C. and S. Cimato (Eds.). LNCS. 3352, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-24301-4, pp: 149-164.

Juels, A., P. Syverson and D. Bailey, 2005. High power proxies for enhancing RFID privacy and utility. Proceedings of the 5th Workshop on Privacy Enhancing Technologies, May 30- Jun. 1, Dubrovnik, Croatia, pp: 210-226.

Juels, A., R. Rivest and M. Szydlo, 2003. The blocker tag: Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computer and Communications Security, October 27-30, 2003, Washington, DC., USA., pp: 103-111.

Karjoth, G. and P. Moskowitz, 2005. Disabling RFID tags with visible confirmation: Clipped tags are silenced. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005), Nov. 7-7, ACM Press, Alexandria, pp: 27-30.

Karygiannis, T., B. Eydt, G. Barber, L. Bunn and T. Phillips, 2007. Guidelines for securing radio frequency identification (RFID) systems. Natl. Inst. Stand. Technol., 800-98: 1-154.
Direct Link  |  

Kawakita, Y., Y. Uo, O. Nakamura and J. Murai, 2005. Use of RFID at large-scale events. Iatss Res., 29: 31-39.
Direct Link  |  

Landt, J., 2001. Shrouds of time: The history of RFID. The Association for Automatic Identification and Data Capture Technologies, Pittsburgh, PA, USA.

LaranRFID, 2005. A basic introduction to RFID technology and its use in the supply chain. White Paper, Laran RFID, USA.

Maghiros, I., P. Rotter and M.V. Lieshout, 2007. RFID technologies: Emerging issues, challenges and policy options. Tech. Report 22770 EN, European Commission Joint Research Centre's Inst. for Prospective Technological Studies. http://ipts.jrc.ec.europa.eu/publications/pub.cfm?id=1476.

Michael, K. and L. Mc-Cathie, 2005. The pros and cons of RFID in supply chain management. Proceedings of the International Conference on Mobile Business, July 11-13, USA., pp: 623-629.

Modrak, V. and P. Knuth, 2009. Security and Reliability of RFID Technology in Supply Chain Management. In: Encyclopedia of Information Science and Technology, Pour, M. (Ed.). 2nd Edn., IGI Global, New York, pp: 3377-3382.

Modr�k, V. and V. Moskvič, 2006. Elimination of time dependence of information validity by application of RFID technology. Proceedings of the 8th International Conference of Enterprise Information Systems (ICEIS 2006), May 23-27, Pathos, Cyprus, pp: 130-135.

Moskvič, V. and V. Modrak, 2007. RFID In Automotive Supply Chain Processes-There is a Case. In: Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, Sobh, T., K. Elleithy, A. Mahmood and M. Karim (Eds.). Springer, New York, USA., pp: 475-480.

Myerson, J.M., 2007. RFID in Supply Chain-A Guide to Selection and Implementation. 1st Edn., Taylor and Francis Group, USA.

Rieback, M.R., B. Crispo and A.S. Tanenbaum, 2006. The evolution of RFID security. IEEE Pervasive Comput., 5: 62-69.
CrossRef  |  Direct Link  |  

Shepard, S., 2005. RFID: Radio Frequency Identification. 1st Edn., McGraw-Hill, New York, pp: 256.

Shutzberg, L., 2004. Analyzing RFIDs reliability and stability limitations. Part Four, Informationweek, Online Article, November 16. http://www.informationweek.com/news/mobility/RFID/showArticle.jhtml?articleID=53200075.

Soleymani, H.R. and S.D. Zahedani, 2006. RFID privacy and security for ID cards and E-passports. RFID Seminar WS 05/06 Final Technical Report, TU Darmstadt, Germany. March 2006. http://www.dvs.tu-darmstadt.de/publications/pdf/rfidsem_techreport.pdf.

Spiekermann, S. and O. Berthold, 2005. Maintaining Privacy in RFID Enabled Environments-Proposal for a Disable-Model. In: Privacy, Security and Trust within the Context of Pervasive Computing, Robinson, P., H. Vogt and W. Wagealla (Eds.). Springer Science and Business Meida Inc., New York, pp: 137-146.

Teskey, M., 2006. Turning RFID data into information. Online Article. http://www.devx.com/enterprise/Article/32251/0/page/4.

Thiesse, F., 2006. Managing risk perceptions of RFID. Auto-ID Labs White Paper, WP-BIZAPP-031.

Thornton, F., B. Haines, A. Das, H. Bhargava, A. Campbell and J. Kleinschmidt, 2006. RFID Security. 1st Edn., Syngress Publishing, Inc., Rockland, MA, USA., ISBN: 1597490474.

Vajda, I. and L. Butty�n, 2003. Lightweight authentication protocols for low-cost RFID tags. Proceedings of the 2nd Workshop on Security in Ubiquitous Computing. Seattle, Washington, USA., October 12, 2003.

Want, R., 2006. An introduction to RFID technology. IEEE Perv. Comput., 5: 25-33.
CrossRef  |  

Weis, S.A., S.E. Sarma, R.L. Rivest and D.W. Engels, 2004. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing, Hulter, D. et al. (Eds.). LNCS. 2802, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-20887-7, pp: 50-59.

Wyld, D.C., 2005. RFID: The right frequency for government: A research monograph from the IBM center for the business of Government. http://www.businessofgovernment.org/main/publications/grant_reports/details/index.asp?gid=232.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved