{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T05:38:50Z","timestamp":1737869930694,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":36,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387308586"},{"type":"electronic","value":"9780387359731"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-35973-1_1071","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T23:27:52Z","timestamp":1199834872000},"page":"943-949","source":"Crossref","is-referenced-by-count":2,"title":["Radio Frequency Identification (RFID)"],"prefix":"10.1007","author":[{"given":"Michael","family":"Goshey","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1071_CR1","unstructured":"Landt, J.: Shrouds of Time: The History of RFID. http:\/\/www.aimglobal.org\/technologies\/rfid\/resources\/shrouds_of_time.pdf , Association for Automatic Identification and Mobility: Retreived 10\/10\/2006 (2001)"},{"key":"1071_CR2","unstructured":"Wikipedia: Radio Frequency Identification. http:\/\/en.wikipedia.org\/w\/index.php?title=Radio_Frequency_Identification&oldid=85251329 , Wikipedia, The Free Encyclopedia: Retreived 10\/10\/2006 (2006)"},{"key":"1071_CR3","doi-asserted-by":"crossref","unstructured":"Vogt, H.: Pervasive Computing: First International Conference Proceedings, In: Efficient Object Identification with Passive RFID Tags, Lecture Notes in Computer Science, vol. 2414, pp. 98. Springer (2002)","DOI":"10.1007\/3-540-45866-2_9"},{"key":"1071_CR4","unstructured":"The British Broadcasting Corporation: Stopping the book thieves. http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/1958424.stm , The BBC News: Retreived 10\/10\/2006 (2002)"},{"key":"1071_CR5","unstructured":"Shim, R.: Wal-Mart to throw its weight behind RFID, http:\/\/news.com.com\/2100-1022-1013767.html?tag=nl , CNET News: Retreived 10\/10\/2006 (2003)"},{"key":"1071_CR6","unstructured":"Bauer, M., Fabian, B., Fischmann, M., G\u00fcrses, S.: Emerging Markets for RFID Traces, Arxiv preprint cs.CY\/0606018 (2006)"},{"key":"1071_CR7","unstructured":"Bluestein, G.:, Companies track gridlock via cell phones. http:\/\/news.yahoo.com\/s\/ap\/20061105\/ap_on_hi_te\/tracking_traffic;_ylt=AoQQdZOHq.vxPTOcxWTRCaDMWM0F;_ylu=X3oDMTA3ODdxdHBhBHNlYwM5NjQ- , Associated Press: Retreived 11\/05\/2006 (2006)"},{"key":"1071_CR8","unstructured":"Saxena, M.: Does GIS and RFID Amalgamation Work? http:\/\/www.geoplace.com\/uploads\/FeatureArticle\/0505tt.asp , Geoplace: Retreived 10\/10\/2006 (2005)"},{"key":"1071_CR9","first-page":"1196","volume":"36","author":"H. Stockman","year":"1948","unstructured":"Stockman, H.: Communication by means of reflected power, Proc. Inst. Radio Engin. 36, 1196\u20131204 (1948)","journal-title":"Inst. Radio Engin."},{"key":"1071_CR10","unstructured":"The United States Navy: Identification Friend or Foe. http:\/\/www.nrl.navy.mil\/content.php?P=FRIENDFOE , United States Naval Research Library: Retreived 11\/05\/2006 (2006)"},{"issue":"6","key":"1071_CR11","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1049\/ip-a-1.1985.0079","volume":"132","author":"L. Bowden","year":"1985","unstructured":"Bowden, L.: The story of IFF (identification friend or foe), IEEE Proceedings, Part A: Physical Science, Measurement and Instrumentation, Management and Education 132(6), 435\u2013437 (1985)","journal-title":"IEEE Proceedings, Part A: Physical Science, Measurement and Instrumentation, Management and Education"},{"issue":"1","key":"1071_CR12","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/TPGAP.1952.237350","volume":"4","author":"F. Vernon Jr","year":"1952","unstructured":"Vernon Jr, F.: Application of the microwave homodyne, Antennas and Propogation, Transactions of the IRE Professional Group on 4(1), 110\u2013116 (1952)","journal-title":"Antennas and Propogation, Transactions of the IRE Professional Group on"},{"key":"1071_CR13","unstructured":"Walton, C.A.: US Patent 3,752,960, 27 December 1971"},{"key":"1071_CR14","unstructured":"The RFID Journal: The History of RFID Technology. http:\/\/www.rfidjournal.com\/article\/articleview\/1338\/1\/129\/ , The RFID Journal: Retreived 10\/10\/2006 (2006)"},{"issue":"8","key":"1071_CR15","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1109\/PROC.1975.9928","volume":"63","author":"A.R. Koelle","year":"1975","unstructured":"Koelle, A.R., Depp, S.W., Freyman, R.W.: Short-range radio-telemetry for electronic identification, using modulated RF backscatter, Proc. IEEE 63(8), 1260\u20131261 (1975)","journal-title":"Proc. IEEE"},{"key":"1071_CR16","unstructured":"Sanjay E. Weis, S., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications, In: Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, vol. 2523, pp. 454\u2013470 (2002) http:\/\/citeseer.ist.psu.edu\/sarma02rfid.html"},{"key":"1071_CR17","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/1030083.1030112","volume-title":"CCS '04: Proceedings of the 11th ACM conference on Computer and communications security","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures, In: CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pp.210\u2013219. ACM Press, New York (2004)"},{"key":"1071_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"CCS '03: Proceedings of the 10th ACM conference on Computer and communications security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy, In: CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pp. 103\u2013111. ACM Press, New York (2003)"},{"key":"1071_CR19","unstructured":"O'Connor, M.C.: Gen 2 EPC Protocol Approved as ISO 18000\u20136C. http:\/\/www.rfidjournal.com\/article\/articleview\/2481\/1\/1\/ , The RFID Journal: Retreived 11\/05\/2006 (2006)"},{"key":"1071_CR20","doi-asserted-by":"crossref","unstructured":"Avoine, G., Oechslin, P.: Financial Cryptography and Data Security, In: RFID traceability: A\u00a0multilayer problem, Lecture Notes in Computer Science, vol. 3570, pp. 125\u2013140. Springer (2005)","DOI":"10.1007\/11507840_14"},{"key":"1071_CR21","doi-asserted-by":"crossref","unstructured":"Juels, A., Pappu, R.: Financial Cryptography, In: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, Lecture Notes in Computer Science, vol. 2742, pp. 103\u2013121. Springer (2003)","DOI":"10.1007\/978-3-540-45126-6_8"},{"key":"1071_CR22","unstructured":"Fulton, N.: High-tech cloning. http:\/\/blogs.reuters.com\/2006\/07\/22\/high-tech-cloning\/ , Reuters: Retreived 10\/10\/2006 (2006)"},{"key":"1071_CR23","doi-asserted-by":"crossref","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security in Pervasive Computing, In: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Lecture Notes in Computer Science, vol. 2802, pp. 201\u2013212. Springer (2004)","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"1071_CR24","doi-asserted-by":"crossref","unstructured":"Indulska, J., McFadden, T., Kind, M., Henricksen, K.: Distributed Applications and Interoperable Systems, In: Scalable Location Management for Context-Aware Systems, Lecture Notes in Computer Science, vol. 2893, pp. 224\u2013235. Springer (2003)","DOI":"10.1007\/978-3-540-40010-3_20"},{"key":"1071_CR25","volume-title":"SAC '03: Proceedings of the 2003 ACM symposium on Applied computing","author":"G. Roussos","year":"2003","unstructured":"Roussos, G., Kourouthanasis, P., Spinellis, D., Gryazin, E., Pryzbliski, M., Kalpogiannis, G., Giaglis, G.: Systems architecture for pervasive retail, In: SAC '03: Proceedings of the 2003 ACM symposium on Applied computing (ACM Press, New York 2003)"},{"key":"1071_CR26","unstructured":"Newsweek: An Internet of Things. http:\/\/www.msnbc.msn.com\/id\/3068871\/ , Newsweek: Retreived 10\/10\/2006 (2006)"},{"issue":"1","key":"1071_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MPRV.2002.993142","volume":"1","author":"N. Davies","year":"2002","unstructured":"Davies, N., Gellersen, H.W.: Beyond prototypes: challenges in deploying ubiquitous systems, Pervasive Computing, IEEE 1(1), 26\u201335 (2002)","journal-title":"Pervasive Computing, IEEE"},{"key":"1071_CR28","doi-asserted-by":"crossref","unstructured":"Tenmoku, R., Kanbara, M., Yokoya, N.: A\u00a0wearable augmented reality system using positioning infrastructures and a\u00a0pedometer, Wearable Computers, 2003. Proceedings. Seventh IEEE International Symposium on 110\u2013117 (2003)","DOI":"10.1109\/ISWC.2003.1241400"},{"key":"1071_CR29","volume-title":"CHI '99: Proceedings of the SIGCHI conference on Human factors in computing systems","author":"R. Want","year":"1999","unstructured":"Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging physical and virtual worlds with electronic tags, In: CHI '99: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York (1999)"},{"key":"1071_CR30","doi-asserted-by":"crossref","unstructured":"Coroama, V., Bohn, J., Mattern, F.: Living in a\u00a0Smart Environment \u2013 Implications for the Coming Ubiquitous Information Society, In: Proceedings of the International Conference on Systems, Man and Cybernetics 2004 (IEEE SMC 2004) 5633\u20135638, http:\/\/citeseer.ist.psu.edu\/coroama04living.html","DOI":"10.1109\/ICSMC.2004.1401091"},{"key":"1071_CR31","unstructured":"Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. http:\/\/eprint.iacr.org\/2006\/137.pdf , Cryptology ePrint Archive: Retreived 10\/10\/2006 (2006)"},{"key":"1071_CR32","unstructured":"Roberti, M.: DOD Releases Final RFID Policy. http:\/\/www.rfidjournal.com\/article\/articleview\/1080\/1\/1\/ , The RFID Journal: Retreived 10\/11\/2006 (2004)"},{"key":"1071_CR33","unstructured":"The RFID Journal: The History of RFID Technology. http:\/\/www.rfidjournal.com\/article\/articleview\/1337\/1\/129\/ , The RFID Journal: Retreived 10\/12\/2006 (2006)"},{"key":"1071_CR34","unstructured":"The RFID Journal: RFID System Components and Costs. http:\/\/www.rfidjournal.com\/article\/articleview\/1336\/1\/129\/ , The RFID Journal: Retreived 10\/12\/2006 (2006)"},{"key":"1071_CR35","unstructured":"The RFID Gazette: Wal-Mart Doubling RFID-Enabled Stores. http:\/\/www.rfidgazette.org\/walmart\/ , The RFID Journal: Retreived 11\/05\/2006 (2006)"},{"key":"1071_CR36","unstructured":"Riscure: Privacy issues with new digital passport. http:\/\/www.riscure.com\/2_news\/passport.html , Riscure BV: Retreived 11\/08\/2006 (2006)"}],"container-title":["Encyclopedia of GIS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35973-1_1071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T13:00:58Z","timestamp":1737810058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35973-1_1071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387308586","9780387359731"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35973-1_1071","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}