Rujukan Pencurian identiti tanpa wayar

  1. Heydt-Benjamin, Thomas S; Bailey, Daniel V; Fu, Keven E; Juels, Ari; O’Hare, Tom (October 22, 2006), Vulnerabilities in First-Generation RFID-enabled Credit Cards (PDF) (draft study), Amherst, MA; Bedford, MA; Salem, MA: University of Massachusetts; RSA Laboratories; Innealta, dicapai pada 2009-03-14.
  2. Newitz, Annalee (May 2006), "The RFID Hacking Underground", Wired, 14 (5).
  3. Phoenix, KPHO-5.
  4. Video, Austin: KVUE-24
  5. Position Statement on the Use of RFID on Consumer Products, Electronic Frontier Foundation.
  6. Mansouri, Djamel (August 2017). "Dynamic and adaptive detection method for flooding in wireless sensor networks". International Journal of Communication Systems. 30.
  7. RFIdiot.
  8. RFID, Texas Instruments.