4Sarma S E,Weis S A,Engels D W.RFID systems and security and pri-vacy implications[A].In:Kaliski B S,Koc C K,Paar C eds.Proceed-ings of the 4th International Workshop on Cryptographic Hardware andEmbedded Systems(CHES2002),Lectures Notes in Computer Science 2523[A].Berlin:Spring-Verlag,2003.454-469
5Melanie R,Rieback,Bruno Crispo,Andrew S Tanenbaum.The Evolu-tion of RFID Security[A].RFID teclmology[C].2006.62-69
6Yang Xiao,Xuemin Shen,Bo Sun,Lin Cai.Security and Privacy inRFID and Applications in Telemedicine[J].IEEE CommunicationsMagazine,2006,(4): 1-4
8Harry K.H.Chow, etal. Design of a RFID case-based resource management system for warehouse operations[J]. Expert Systems with Applications, 2006,30:561-576.
9Poon, T.C., etal. A RFID case-based logistics resource management system for managing gorder-picking operations in ware- houses[J]. Expert Systems with Applications, 2008(10):11.