暂无分享,去创建一个
[1] Sandip Lahiri,et al. RFID Sourcebook , 2005 .
[2] Roman Espejo,et al. RFID Technology , 2009 .
[3] Katherine Albrecht,et al. Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .
[4] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[5] James G. Jones,et al. A+ Exam Cram , 1998 .
[6] ABCs of RFID: Understanding and using radio frequency identification , 2007 .
[7] H. Stockman,et al. Communication by Means of Reflected Power , 1948, Proceedings of the IRE.
[8] Gottfried Vossen,et al. A Design and Development Methodology for Mobile RFID Applications Based on the ID-Services Middleware Architecture , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[9] Roy Want,et al. Enabling ubiquitous sensing with RFID , 2004, Computer.
[10] Matthias Schumann,et al. RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.
[11] Jürgen Bohn. Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.
[12] Joël Dansou-Eloi. RFID technology , 2005, sOc-EUSAI '05.
[13] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[14] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[15] Hanifa Shah,et al. The Role of Enterprise Architecture in Healthcare-IT , 2009, 2009 Sixth International Conference on Information Technology: New Generations.