Publisher
Springer Nature Switzerland
Reference15 articles.
1. Ait, S., Lhadj Lamin, A. Raghib, and Abou El Majd, B.: Robust multi-objective optimization for solving the RFID Network Planning Problem, Mathematical Modeling and Computing, vol. 8, no. 4, pp. 616–626, https://doi.org/10.23939/mmc2021.04.616. (2021).
2. Ahsan, K., Hanifa, S., & Kingston, P.: RFID Applications: An Introductory and Exploratory Study. International Journal of Computer Science Issues, 7, 1–8 (2010).
3. Xiao, Q., Gibbons, T. and Lebru, H.: RFID Technology, Security Vulnerabilities, and Countermeasures. Supply Chain the Way to Flat Organisation, 4(4), Intech., doi:https://doi.org/10.5772/6668. (2009).
4. Williamson, A., Tsay, L.-S., Kateeb, I.A., and Burton, L.: Solutions for RFID Smart Tagged Card Security Vulnerabilities. AASRI Procedia, 4(4), 282–287. doi: https://doi.org/10.1016/j.aasri.2013.10.042. (2013).
5. Azuaje, R.: Securing IoT: Hardware Vs Software, Journal of Advances in Information Technology, vol. 9, no. 3, pp. 79–83. doi: https://doi.org/10.12720/jait.9.3.79-83. (2018).