1S A Weis,S Sarma,R Rivest,et al.Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C].The 1st International Conference on Security in Pervasive Computing,volume 2802 of Lecture Notes in Computer Science,2004.201-212.
2Sanjay E Sarma,et al.RFID Systems and Security and Privacy Implications[C].Workshop on Cryptographic Hardware and Embedded Systems,Lecture Notes in Computer Science,2002.454-470.
3Robert M Metcalfe,David R Boggs.Ethernet:Distributed Packet Switching for Local Computer Networks[J].Communications of the ACM,1976,19(5):395-404.
4A Juels,R Pappu.Squealing Euros:Privacy Protection in RFID-enabled Banknotes[C].Financial Cryptography'03,2003.134-145.
5A Juels,R Rivest,M Szydlol.The Blocker Tag:Selective Blocking of RFID Tags for Consumer Privacy[C].The 8th ACM Conference on Computer and Communications Security,ACM Press,2003.103-111.
7S J James,The food cold-chain and climate change[J].Food Research International,2010,43(7):1944-1956.
8Marija Bogataj.Stability of perishable goods in cold logistic chains[J].International Journal of Production Economics,2005,(93-94):345-356.
9C M Roberts.Radio frequency identification (RFID)[J].Comput- ers&Security,2006,25(1):18-26.
10Alp Ustundag,Mehmet Tanyas.The impacts of Radio Frequency Iden- tification (RFID) technology on supply chain costs[J].Transportation Research(Part E),2009,45(1):29-38.