Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Behzad, A., Baghery, K., Akhbari, B., & Reza, A., M. (2015).

Cryptanalysis of two EPC-based

RFID security schemes. In International ISC Conference on Information Security and

Cryptology, 6 (23), 1–6.

Team, T. (2018, March 26). The Beginner’s Guide to RFID Technology for Events. Token RFID.

https://www.gettoken.com/beginners-guide-rfid-technology-events/

Srujana, A., & Swetha, P. (2014). Security Solution for Real Time Location Systems Using

Distance Bounding. International Journal of Technology and Engineering Science, 2(6),

1933–1937

Afolabi, A., O., & Atayero, A., A., Ajayi P., & Wogu. P. (2015). Implementation of biometric

RFID identification system: A case study of Covenant University. New York: SAGE.

Bowler, J. (2020, March 2). RFID Wristbands - What you need to know (according to our

London office). Printsome Insights. https://blog.printsome.com/rfid-wristbands-good-bad/

Kumar, A., Ansari, A. Q., Kanaujia, B., Kishor, J., & Tewari, N. (2018). Design of triple-band

MIMO antenna with one band-notched characteristic. Progress In Electromagnetics

Research C, 86, 41-53

Sardroud, J. M. (2012). Influence of RFID technology on automated management of construction

materials and components. Scientia Iranica, 19(3), 381-392.

https://doi.org/10.1016/j.scient.2012.02.023

Chike, C. P., & CISSP, C. (2017). The legal challenges of Internet of Things. University of

Maryland University College, 1-29.

Tanvi A., Biswas, P., K., & Raoot, A., D. (2012). An optimized query tree algorithm in RFID

inventory tracking– a case study evidence. IJCSI International Journal of Computer

Science Issues, 9(1), 85–93.


Federal Trade Commission. (2005). RFID Report: Applications and Implications for Consumers.

Retrieved December 7, 2019, from

https://www.ftc.gov/sites/default/files/documents/reports/rfid-radio-

frequencyidentification-applications-and-implications-consumers-workshop-reportstaff/

050308rfidrpt.pdf

Archer, Q., & Salazar, G. (2005). RFID: a threat to privacy? Retrieved December 7, 2019, from

http://www.computerweekly.com/opinion/RFID-a-threat-to-privacy

DataFlows Dimensions, Inc. (n.d.). THE DATAFLOWS APPROACH TO RFID DUE

DILIGENCE. Retrieved December 7, 2019, from

http://www.dataflows.com/RFIDduedil2.shtml

UpGuard. (2017). Five Things to Know About Third Party Risk. Retrieved December 7, 2019,

from https://www.upguard.com/articles/five-things-to-know-about-third-party-risk

Karygiannis, T., Eydt, B., Barber, G., Bunn, L., & Phillips, T. (2007). NIST SP 800-98,

Guidelines for Securing Radio Frequency Identification (RFID) Systems. Retrieved

December 4, 2019, from

https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-98.pdf

You might also like