7Rao K V, Nikitin P V, Lam S F. Antenna design for UHF RFID tags:a review and a practical application [ J ]. IEEE Trans on Ant Prop,2005,53(12) :3870. 被引量:1
8HEN Chun-te,LEE Kun-lin,WU Y C,et al.Construction of theenterprise-level RFID security and privacy management usingrole-based key management[C].Proc of IEEE International Con-ference on Systems, Man, and Cybemetics,2006:3310-3317. 被引量:1
9PARK N,LEE J,KIM H,et al.A layered approach to design oflightweight middleware systems for mobile RFID security[C].Proc of the 10th IEEE/IFIP Network Operations and Manage-ment Symposium,2006:1-6. 被引量:1
10TOIRUUL B,LEE K.An advanced mutual-authentication al-gorithm using AES for RFID systems[J]. International Jour-nal of Computer Science and Network Security, 2006,6 (9):156-162. 被引量:1
3WANG Y C, Kao M C, Chang C P. Investigation on the spin- dle thermal displacement and its compensation of precision cutter grinders. Measurement ,2011,44 : 1183 - 1187. 被引量:1
4Kirsi S, Toni B, Leena U, et al. Reliability Analysis of RFID Tags in Changing Humid Environment. IEEE Transactions on Components Packaging and Manufacturing Technology, 2014,4( 1 ) :77 - 85. 被引量:1
5Zhu X, Mukhopadhyay S K, Kurata H. A review of RFID technology and its managerial applications in different indus- tries. Journal of Engineering and Technology Management, 2012,29( 1 ) : 152 - 167. 被引量:1