1. Hunt, V. D., Puglia, A., & Puglia, M. (2007). RFID: A guide to radio frequency identification. NY: John Wiley & Sons.
2. Pang, L., He, L., Pei, Q., & Wang, Y. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard. In Wireless Communications and Networking Conference (WCNC), 2013 IEEE, 2013 (pp. 1870–1875). IEEE.
3. SA, S. W. (2011). RFID (radio frequency identification): Principles and applications. Retrived from www.eecs.harvard.edu/rfid-article.pdfon,1 .
4. Park, Y., Sur, C., Jung, C. D., & Rhee, K.-H. (2009). Efficient anonymous authentication protocol using key-insulated signature scheme for secure VANET. In Mobile lightweight wireless systems (pp. 35–44). Springer.
5. Health, U. D. O., & Services, H. (2004). Combating Counterfeit Drugs, A Report of the Food and Drug Administration. Food and Drug Administration. http://www.fda.gov/oc/initiatives/counterfeit/report02_04.pdf .