Near field communication : from theory to practice / Vedat Coskun, Kerem Ok, and Busra Ozdenizci
Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Hoboken : John Wiley & Sons, 2012Edition: Online-AusgDescription: Online-Ressource (1 online resource (xxviii, 361 p.)) : illISBN:- 9781283409780
- 128340978X
- 9781119971092
- 9781119965787
- 621.384
- TK6570.N43
- TK6570.N43 C67 2012
Contents:
Summary: Includes bibliographical references and indexPPN: PPN: 80950796XPackage identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE
NEAR FIELD COMMUNICATION; Contents; Preface; Acknowledgments; List of Acronyms; 1 Executive Summary; 1.1 Towards NFC Era; 1.1.1 Ubiquitous Computing; 1.1.2 Mobile Phones; 1.1.3 Technological Motivation of NFC; 1.1.4 Wireless Communication, RFID, and NFC; 1.2 Evolution of NFC; 1.2.1 Earlier Form of RFID: Barcode Technology; 1.2.2 RFID Technology; 1.2.3 Earlier Form of Smart Cards: Magnetic Stripe Cards; 1.2.4 Smart Card Technology; 1.2.5 NFC as a New Technology; 1.3 NFC Essentials; 1.3.1 Smart NFC Devices; 1.3.2 Standardization of NFC Enabled Mobile Phones
1.3.3 General Architecture of NFC Enabled Mobile Phones1.3.4 Near Field Communication Interface and Protocol (NFCIP); 1.4 NFC Operating Modes and Essentials; 1.4.1 NFC Operating Modes; 1.4.2 Reader/Writer Mode Essentials; 1.4.3 Peer-to-Peer Mode Essentials; 1.4.4 Card Emulation Mode Essentials; 1.4.5 Case Studies; 1.5 SE and Its Management; 1.5.1 Over-the-Air Technology; 1.5.2 GlobalPlatform Card Specification; 1.5.3 Trusted Service Manager; 1.5.4 UICC Management Models; 1.5.5 Multiple SE Environments; 1.6 NFC Application Development; 1.6.1 JSR 257; 1.6.2 JSR 177; 1.7 NFC Security and Privacy
1.7.1 Why is Security Important?1.7.2 Primary Goals of Security Measures; 1.7.3 Vulnerability, Threat, Attack, and Risk; 1.7.4 Security Tools and Mechanisms; 1.7.5 NFC Security; 1.7.6 Privacy, Legal, and Ethical Aspects; 1.8 NFC Business Ecosystem; 1.8.1 Stakeholders in NFC Ecosystem; 1.8.2 Understanding NFC Business Models; 1.8.3 Business Model Approaches; 1.9 Usability in NFC; 1.10 Benefits of NFC Applications; 1.10.1 Future Scenarios on NFC; 1.11 NFC Throughout the World; 1.11.1 NFC Cities; 1.11.2 NFC Trials and Projects; 1.12 Status of Academic Research on NFC Literature
1.13 Chapter SummaryReferences; 2 Towards NFC Era; 2.1 Ubiquitous Computing and NFC; 2.1.1 Ubiquitous Computing; 2.1.2 New Communication Interface Alternative for Mobile Phones: NFC Technology; 2.2 Mobile Phones; 2.2.1 Features of a Mobile Phone; 2.2.2 Mobile Phone Network; 2.2.3 Mobile Phone Architecture; 2.3 Wireless Communication as a Communication Media for NFC Technology; 2.3.1 Wireless, Mobile, and Nomadic Communication; 2.3.2 Wireless and Mobile Communication Technologies; 2.4 RFID Technology; 2.4.1 Earlier Form of RFID: Barcode Technology; 2.4.2 Barcodes vs. RFID Tags
2.4.3 Essentials of RFID Technology2.4.4 RFID Tags as Transponders; 2.4.5 RFID Readers; 2.4.6 Frequency Ranges; 2.4.7 Operating Principles of RFID Technology; 2.4.8 Near Field vs. Far Field Transmission; 2.4.9 Common RFID Applications Throughout the World; 2.5 Smart Card Technology; 2.5.1 Earlier Form of Smart Card: Magnetic Stripe Cards; 2.5.2 Evolution of Smart Cards; 2.5.3 Types of Smart Cards: Capability Based Classification; 2.5.4 Smart Card Operating System (SCOS); 2.5.5 Types of Smart Cards: Mechanism Based Classification; 2.5.6 Smart Card Applications
2.6 Comparison between RFID Tags and Contactless Smart Cards
No physical items for this record