1. RFID technology: supply-chain applications and implementations issues;Angeles;Information Systems Management,2005
2. Security implications in RFID and authentication processing framework;Ayoade;Computers & Security,2006
3. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards;Chien;Computer Standards and Interfaces,2007
4. Dimitriou, T., 2005. A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks Secure Comm.
5. EPC (Electronic Product Code) Class1 Generation2 standard by EPCglobal, 2008. Description at 〈http://www.epcglobalinc.org/〉 (access available on 15 March 2008).