[1]
Jihoon Myung, Wonjun Lee and Srivastava J., Adaptive binary splitting for efficient RFID tag anti-collision[J]. IEEE communication letters,v01.10,pp.144-146.
DOI: 10.1109/lcomm.2006.1603365
Google Scholar
[2]
Taseung Kim, Howon Kim. Access Control for Middleware in RFID Systems. Technical report, 2006, (2):1020-1022.
Google Scholar
[3]
David J. Puleson, Ian J. Forster. A Framework for consistent evaluation of RFID Tags from design and manufacture o end use.Technical report, 2005. (10).
Google Scholar
[4]
WANG Cheng, SHI Tianyun, JIANG Qiuhua, et al. RFID Application in China Railway Passenger Transport System[J]. Railway Computer Application, 2008(5).
Google Scholar
[5]
ZHAO Yongjun, ZHAO Lihui, LI Zhong, et al. Implementation on Research of Middleware Technology Based on RFID.
Google Scholar
[6]
GU Y, YU G, HU X, et al. Efficient RFID data cleaning model based on dynamic clusters of monitored objects[J]. Journal of Software, 2010, 21(4): 632-643.
DOI: 10.3724/sp.j.1001.2010.03565
Google Scholar
[7]
TRAN T, SUTTON C, COCCI R, et al. Probabilistic inference over RFID streams in mobile environments[C]. Proceedings of the 25th International Conference on Data Engineering. Piscataway, NJ, USA: IEEE, 2009: 1096-1107.
DOI: 10.1109/icde.2009.33
Google Scholar
[8]
RAO J, DORAISWAMY S, THAKKAR H, et al. A deferred cleansing method for RFID data analytics[C]. Proceedings of the 32nd International Conference on Very large Data Bases. Almaden, CA, USA: VLDB Endowment Inc., 2006: 175-186.
Google Scholar
[9]
Md. Morshed, Anthony Atkins, Hong-Nian Yu et al . An efficient and secure authentication protocol for RFID systems[J]. International Journal of Automation and Computing, 2012, Vol. 9(3).
DOI: 10.1007/s11633-012-0642-4
Google Scholar
[10]
Ding WANG. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards[J]. The Journal of China Universities of Posts and Telecommunications, 2012, 19(5).
DOI: 10.1016/s1005-8885(11)60307-5
Google Scholar