RFID malware:Design principles and examples

Printable View