1. Roberts, C.M.: Radio frequency identification (RFID). Comput. Secur. 25(1), 18–26 (2006)
2. Landt, J.: The history of RFID. IEEE Potentials 24(4), 8–11 (2005)
3. Ahsan, K., Shah, H., Kingston, P.: RFID applications: an introductory and exploratory study. (2010). arXiv preprint arXiv:1002.1179
4. Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
5. Saito, J., Imamoto, K., Sakurai, K.: Reassignment scheme of an RFID tag’s key for owner transfer. In: International Conference on Embedded and Ubiquitous Computing, pp. 1303–1312. Springer (2005)