Roy Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, Santa Clara, 2006, PP. 25-33.
 Ron Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” IT Pro-fessional, Vol. 7, No. 3, June 2005, pp. 27-33.
 Klaus Finkenzeller, “RFID Handbook,” 2nd edition, John Wiley & Sons, Ciudad Real, 2003.
 Badri Nath, Franklin Reynolds, Roy Want, “RFID Technology and Applications,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.
 Timo Salminen, Simo Hosio and Jukka Riekki, “Enhancing Bluetooth Connectivity with RFID,” Proceedings of the Fourth Annual IEEE International Conference on Perva-sive Computing on Pervasive Computing and Communi-cations, Pisa, 2006, pp. 6-41.
 Lei Zhang and Zhi Wang, “Integration of RFID into Wireless Sensor Net-works: Architectures, Opportunities and Challenging Problems,” Proceedings of the Fifth International Confe-rence on Grid and Cooperative Computing Workshops, Hunan, 2006, pp.463-469.
 N.Krahntoever, J.Rittscher, P.Tu, K.Chean and T.Tomlin-son, “Activity Recognition Using Visual Tracking and RFID,” Pro-ceedings of the Seventh IEEE Workshop on Applications for Computer Vision, Vol. 1, New York ,2005, pp. 494-500.
 Melanie R.Rieback, Bruno Crispo and Andrew S.Tanen-baum, “RFID Malware,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 70-72.
 Hyun-Seok Kim, Jeong-Hyum Ob and Jin-Young Choi, “Security Analysis of RFID Authentica-tion for Pervasive Systems using Model Checking,” Pro-ceedings of the 30th Annual International Computer Software and Applications Conference, Vol. 2, Chicago, 2006, pp. 195-202.
 Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi and Jin-Woo Kim, “The Vulnerabilities Analysis and Design of the Security Protocol for RFID System,” Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, Seoul, 2006, p.152.
 Simon L.Garfinkel, Ari Juels and Ravi Pappu, “RFID Privacy: An Overview of Prob-lems and Proposed Solutions,” IEEE Security and Privacy, Vol. 3, No. 3, Massachusetts, 2005, pp.34-43.
 Fred Niederman, Richard G.Mathieu, Roger Morley, and Ik-Whan Kwon, “Examining RFID Applications in Supply Caching Management,” Communications of the ACM, Vol. 50, No. 7, July 2007, pp. 92-101.
 Zoltan Nochta, Thorsten Staake and Elgar Fleisch, “Product Specific Security Features Based on RFID Technology,” Proceedings of the International Symposium on Applications and the Internet Workshops, Phoenix, 2005. pp. 4-75.
 Ramaswamy Chandramouli, Tim Grance, Rick kuhn, and Susan Landau, “Security Standards for the RFID Market,” IEEE Security and Privacy, Vol. 3, No. 6, McLean, 2005, pp. 85-89.
 Katina Michael and Luke McCathie, “The Pros and Cons of RFID in Supply Chain Management,” Proceedings of the International Conference on Mobile Business, Sydney, 2005, pp. 623-629.
 Melanie R.Rieback, Bruno Crispo and Andrew S. Tanenbaum, “The Evolution of RFID Security,” IEEE Pervasive Computing, Vol. 5, No. 1, 2006, pp. 62-69.