[1] Roy Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, Santa Clara, 2006, PP. 25-33.
[2] Ron Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” IT Pro-fessional, Vol. 7, No. 3, June 2005, pp. 27-33.
[3] Klaus Finkenzeller, “RFID Handbook,” 2nd edition, John Wiley & Sons, Ciudad Real, 2003.
[4] Badri Nath, Franklin Reynolds, Roy Want, “RFID Technology and Applications,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.
[5] Timo Salminen, Simo Hosio and Jukka Riekki, “Enhancing Bluetooth Connectivity with RFID,” Proceedings of the Fourth Annual IEEE International Conference on Perva-sive Computing on Pervasive Computing and Communi-cations, Pisa, 2006, pp. 6-41.
[6] Lei Zhang and Zhi Wang, “Integration of RFID into Wireless Sensor Net-works: Architectures, Opportunities and Challenging Problems,” Proceedings of the Fifth International Confe-rence on Grid and Cooperative Computing Workshops, Hunan, 2006, pp.463-469.
[7] N.Krahntoever, J.Rittscher, P.Tu, K.Chean and T.Tomlin-son, “Activity Recognition Using Visual Tracking and RFID,” Pro-ceedings of the Seventh IEEE Workshop on Applications for Computer Vision, Vol. 1, New York ,2005, pp. 494-500.
[8] Melanie R.Rieback, Bruno Crispo and Andrew S.Tanen-baum, “RFID Malware,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 70-72.
[9] Hyun-Seok Kim, Jeong-Hyum Ob and Jin-Young Choi, “Security Analysis of RFID Authentica-tion for Pervasive Systems using Model Checking,” Pro-ceedings of the 30th Annual International Computer Software and Applications Conference, Vol. 2, Chicago, 2006, pp. 195-202.
[10] Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi and Jin-Woo Kim, “The Vulnerabilities Analysis and Design of the Security Protocol for RFID System,” Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, Seoul, 2006, p.152.
[11] Simon L.Garfinkel, Ari Juels and Ravi Pappu, “RFID Privacy: An Overview of Prob-lems and Proposed Solutions,” IEEE Security and Privacy, Vol. 3, No. 3, Massachusetts, 2005, pp.34-43.
[12] Fred Niederman, Richard G.Mathieu, Roger Morley, and Ik-Whan Kwon, “Examining RFID Applications in Supply Caching Management,” Communications of the ACM, Vol. 50, No. 7, July 2007, pp. 92-101.
[13] Zoltan Nochta, Thorsten Staake and Elgar Fleisch, “Product Specific Security Features Based on RFID Technology,” Proceedings of the International Symposium on Applications and the Internet Workshops, Phoenix, 2005. pp. 4-75.
[14] Ramaswamy Chandramouli, Tim Grance, Rick kuhn, and Susan Landau, “Security Standards for the RFID Market,” IEEE Security and Privacy, Vol. 3, No. 6, McLean, 2005, pp. 85-89.
[15] Katina Michael and Luke McCathie, “The Pros and Cons of RFID in Supply Chain Management,” Proceedings of the International Conference on Mobile Business, Sydney, 2005, pp. 623-629.
[16] Melanie R.Rieback, Bruno Crispo and Andrew S. Tanenbaum, “The Evolution of RFID Security,” IEEE Pervasive Computing, Vol. 5, No. 1, 2006, pp. 62-69.