1. Australia, E.-C. (2014). Access control, sensor control, and transponders. http://www.rfid.com.au/rfiduhf.htm . Accessed 01 July 2014.
2. Transport for London. (2014). http://www.tfl.gov.uk/microsites/interchange/82.aspx . Accessed 20 June 2014.
3. Maharjan, S. (2010). RFID and IOT: An overview. Simula Research Laboratory, University of Oslo.
4. Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., & Xinling, Y. (2013). Hash-based RFID mutual authentication protocol. International Journal of Security & Its Applications, 7(3), 183–194.
5. Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Journal of Computer Communication, 34, 556–566.