Professional Documents
Culture Documents
Behzad
Behzad
Team, T. (2018, March 26). The Beginner’s Guide to RFID Technology for Events. Token RFID.
https://www.gettoken.com/beginners-guide-rfid-technology-events/
Srujana, A., & Swetha, P. (2014). Security Solution for Real Time Location Systems Using
1933–1937
Afolabi, A., O., & Atayero, A., A., Ajayi P., & Wogu. P. (2015). Implementation of biometric
RFID identification system: A case study of Covenant University. New York: SAGE.
Bowler, J. (2020, March 2). RFID Wristbands - What you need to know (according to our
Kumar, A., Ansari, A. Q., Kanaujia, B., Kishor, J., & Tewari, N. (2018). Design of triple-band
https://doi.org/10.1016/j.scient.2012.02.023
Chike, C. P., & CISSP, C. (2017). The legal challenges of Internet of Things. University of
Tanvi A., Biswas, P., K., & Raoot, A., D. (2012). An optimized query tree algorithm in RFID
https://www.ftc.gov/sites/default/files/documents/reports/rfid-radio-
frequencyidentification-applications-and-implications-consumers-workshop-reportstaff/
050308rfidrpt.pdf
Archer, Q., & Salazar, G. (2005). RFID: a threat to privacy? Retrieved December 7, 2019, from
http://www.computerweekly.com/opinion/RFID-a-threat-to-privacy
http://www.dataflows.com/RFIDduedil2.shtml
UpGuard. (2017). Five Things to Know About Third Party Risk. Retrieved December 7, 2019,
from https://www.upguard.com/articles/five-things-to-know-about-third-party-risk
Karygiannis, T., Eydt, B., Barber, G., Bunn, L., & Phillips, T. (2007). NIST SP 800-98,
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-98.pdf