Skip to main content

Privacy Protection and RFID

  • Chapter
Ubiquitous and Pervasive Commerce

Part of the book series: Computer Communications and Networks ((CCN))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Albrecht. Scandal: Wal-Mart, P&G Involved in Secret RFID Testing. Archived at: http://www.spychips.com/broken_arrow.htm. November 10. 2003.

    Google Scholar 

  2. European Commission. European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://europa.eu.int/comm/internal_market/en/dataprot/law/

    Google Scholar 

  3. Food and Drug Administration. Combating Counterfeit Drugs. U. S. Department of Health and Human Services, Food and Drug Administration Rockville, Maryland 20857. 2004.

    Google Scholar 

  4. S. Garfinkel. Smartcard Holder’s Bill of Rights. Archived at: http://www.simson.net/smartrights.html.

    Google Scholar 

  5. R. Ingrassia and A. McQuillan. City car theft is on the skids. New York Daily News. Archived at http://www.cnn.com/2000/LOCAL/northeast/08/01/mny.car.theft/. August 1. 2000.

    Google Scholar 

  6. P. Lewis. RFID: Getting Under Your Skin? Fortune Magazine. http://www.fortune.com/fortune/ontech/0,15704,675442,00.html. August 1. 2004.

    Google Scholar 

  7. Organization for Economic Co-operation and Development. Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 1980.

    Google Scholar 

  8. Philips Semiconductors. Identification-Identification Applications-Car Immobilization. Archived at: http://www.semiconductors.philips.com/markets/identification/applications/vaccess/immobilization/index.html. 2004.

    Google Scholar 

  9. RFID Journal. Nokia Unveils RFID Phone Reader. March 17. Archived at http://www.rfidjournal.com/article/articleview/834/1/1/. 2004.

    Google Scholar 

  10. C.R. Schoenberger. The Internet of Things. Forbes. March 18. 2002.

    Google Scholar 

  11. H. Stockman. Communication by Means of Reflected Power. Proceedings of the IRE. 35:1196–1204. 1948.

    Google Scholar 

  12. The House of Commons of Canada. Personal Information Protection and Electronic Documents Act. Bill C-6, 2nd Session, 36th Parliament, 48 Elizabeth II. 1999.

    Google Scholar 

  13. U.S. Department of Health, Education and Welfare. Records, computers, and the Rights of Citizens. Report of Secretary’s Advisory Committee on Automated Personal Data Systems. 1973.

    Google Scholar 

  14. J. Westhues. Hacking the Prox Card. In S. Garfinkel and B. Rosenberg (Eds) RFID: Perspectives, Policy, and Practice. Addison-Wesley. 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this chapter

Cite this chapter

Garfinkel, S. (2006). Privacy Protection and RFID. In: Roussos, G. (eds) Ubiquitous and Pervasive Commerce. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/1-84628-321-3_11

Download citation

  • DOI: https://doi.org/10.1007/1-84628-321-3_11

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-035-1

  • Online ISBN: 978-1-84628-321-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics