1. Xie, W., Xie, L., Zhang, C., Wang, Q., Xu, J., Zhang, Q., et al. (2014). RFID seeking: Finding a lost tag rather than only detecting its missing. Journal of Network and Computer Applications, 42, 135–142.
2. Tajima, M. (2007). Strategic value of RFID in supply chain management. Journal of purchasing and supply management, 13(4), 261–273.
3. Van Deursen, N., Buchanan, W. J., & Duff, A. (2013). Monitoring information security risks within health care. Computers & Security, 37, 31–45.
4. Gross, H., Wenger, E., Martín, H., & Hutter, M. (2014). Pioneera prototype for the internet of things based on an extendable EPC gen2 RFID tag. In International Workshop on Radio Frequency Identification: Security and Privacy Issues (pp. 54–73). Springer.
5. Galins, A., Beinarovics, P., Laizans, A., & Jakusenoks, A., et al. (2016). RFID application for electric car identification at charging station. In Engineering for Rural Development: Proceedings of the 15th International scientific conference (pp. 25–27).