References
1. K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart
Cards and Identification, 2nd ed. John Wiley & Sons, Ltd, 2003.
2. E. W. Schuster, S. J. Allen, and D. L. Brock, Global RFID: The value of the
EPCglobal network for supply chain management. Springer, 2007. [Online]. Available:
http://www.amazon.com/Global-RFID-EPCglobal-Network-Management/dp/3540356541
3. S. Sarma, “Towards the 5 cent tag,” MIT Auto-ID Center, Tech. Rep., 11 2001.
4. D. Hunt, A. Puglia, and M. Puglia, RFID: A Guide to Radio Frequency Identification. Wiley,
2007.
5. “RFID tag pricing guide,” ODIN Technologies, Tech. Rep., 05 2009.
6. K. Traub, F. Armenio, H. Barthel, L. Burstein, P. Dietrich, J. Duker, J. Garrett,
B. Hogan, O. Ryaboy, S. Sarma, J. Schmidt, K. Suen, and J. Williams, The
EPCglobal Architecture Framework 1.2, GS1 Std., 09 2007. [Online]. Available:
http://www.epcglobalinc.org/standards/architecture/
7. EPCglobal, Application Level Events (ALE) Specification 1.1, GS1 Std., 02 2008. [Online].
Available: http://www.epcglobalinc.org/standards/ale
8. ——, EPC Information Services (EPCIS) 1.0.1 Specification, GS1 Std., 09 2007. [Online].
Available: http://www.epcglobalinc.org/standards/epcis
9. ——, Object Name Service (ONS) 1.0.1, GS1 Std., 05 2008. [Online]. Available:
http://www.epcglobalinc.org/standards/ons
10. P. Albitz and C. Liu, DNS and BIND, 5th ed. O’Reilly Media, Inc., May 2006. [Online].
Available: http://proquest.safaribooksonline.com/0596100574
11. C. Floerkemeier, C. Roduner, and M. Lampe, “RFID application development with the
Accada middleware platform,” IEEE Systems Journal, Special Issue on RFID Technology,
12 2007. [Online]. Available: http://www.fosstrak.org/publ/FosstrakIEEESystems.pdf
12. S. L. Garfinkel, A. Juels, and R. Pappu, “RFID privacy: An overview of problems and pro-
posed solutions,” IEEE Security and Privacy, vol. 3, pp. 34–43, 2005.
13. A. Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 381–394, 02 2006.
14. B. Fabian, O. Gunther, and S. Spiekermann, “Security analysis of the object
name service,” in 3rd International Workshop on Security, Privacy and Trust in
Pervasive and Ubiquitous Computing (SECPerU), 07 2005. [Online]. Available:
http://lasecwww.epfl.ch/ gavoine/download/papers/FabianGS-2005-sptpuc.pdf
15. G. Swamy and S. Sarma, “Manufacturing cost simulations for low cost RFID systems,” MIT
Auto-ID Center, Tech. Rep., 2003.
16. E. Fleisch, “What is the Internet of Things? an economic perspective,” ETH Zurich / Univer-
sity of St. Gallen Auto-ID Labs, Tech. Rep., 01 2010.
78