M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. of POPL, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Untraceability in the applied pi-calculus, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), pp.1-6, 2009.
DOI : 10.1109/ICITST.2009.5402514

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010.
DOI : 10.1109/CSF.2010.15

G. Avoine, Adversary model for radio frequency identification, 2005.

G. Avoine, Cryptography in Radio Frequency Identification and Fair Exchange Protocols, 2005.

R. Berman, A. Fiat, and A. Ta-shma, Provable Unlinkability against Traffic Analysis, Proc. of Financial Cryptography, pp.266-280, 2004.
DOI : 10.1007/978-3-540-27809-2_26

M. Brusó, K. Chatzikokolakis, and J. Den-hartog, Formal Verification of Privacy for RFID Systems, 2010 23rd IEEE Computer Security Foundations Symposium, pp.75-88, 2010.
DOI : 10.1109/CSF.2010.13

M. Burmester, T. V. Le, and B. De-medeiros, Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols, 2006 Securecomm and Workshops, pp.1-9, 2006.
DOI : 10.1109/SECCOMW.2006.359563

R. Chadha, S. Delaune, and S. Kremer, Epistemic Logic for the Applied Pi Calculus, Proceedings of IFIP. LNCS, pp.182-197, 2009.
DOI : 10.1016/j.entcs.2006.08.026

C. Chatmon, T. Van-le, and M. Burmester, Secure anonymous RFID authentication protocols, 2006.

F. Dechesne, M. R. Mousavi, and S. Orzan, Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap, Proc. of LPAR, pp.226-241, 2007.
DOI : 10.1007/978-3-540-75560-9_18

T. Van-deursen, S. Mauw, and S. Radomirovic, Untraceability of RFID Protocols, Proc. of WISTP, pp.1-15, 2008.
DOI : 10.1007/11495628_4

T. Van-deursen and S. Radomirovic, Algebraic Attacks on RFID Protocols, Proc. of WISTP, pp.38-51, 2009.
DOI : 10.1007/978-3-642-03944-7_4

M. Franz, B. Meyer, and A. Pashalidis, Attacking Unlinkability: The Importance of Context, Proc. of Privacy Enhancing Technologies, pp.1-16, 2007.
DOI : 10.1007/978-3-540-75551-7_1

J. Y. Halpern and K. R. O-'neill, Anonymity and information hiding in multiagent systems, Proc. of CSFW, pp.75-88, 2003.

D. Hughes and V. Shmatikov, Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004.
DOI : 10.3233/JCS-2004-12102

A. Juels and S. A. Weis, Defining strong privacy for rfid, Proc. of PerCom Workshops, pp.342-347, 2007.

J. J. Meyer and W. Hoek, Epistemic Logic for AI and Computer Science, 2004.
DOI : 10.1017/CBO9780511569852

R. Milner, J. Parrow, and D. Walker, A calculus of mobile processes, I, Information and Computation, vol.100, issue.1, pp.1-77, 1989.
DOI : 10.1016/0890-5401(92)90008-4

K. Nohl and D. Evans, Privacy through Noise: A Design Space for Private Identification, 2009 Annual Computer Security Applications Conference, 2009.
DOI : 10.1109/ACSAC.2009.55

M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic approach to " privacy-friendly " tags, Proc. of RFID Privacy Workshop, 2003.

K. Ouafi and R. C. Phan, Privacy of Recent RFID Authentication Protocols, Proc. of ISPEC, pp.263-277, 2008.
DOI : 10.1007/978-3-540-79104-1_19

A. Pfitzmann and M. Köhntopp, Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2000.
DOI : 10.1007/3-540-44702-4_1

S. Steinbrecher and S. Kopsell, Modelling Unlinkability, Proc. of Privacy Enhancing Technologies, pp.32-47, 2003.
DOI : 10.1007/978-3-540-40956-4_3

P. F. Syverson and S. G. Stubblebine, Group Principals and the Formalization of Anonymity, Proc. of World Congress on Formal Methods, pp.814-833, 1999.
DOI : 10.1007/3-540-48119-2_45

S. Vaudenay, On Privacy Models for RFID, Proc. of ASIACRYPT, pp.68-87, 2007.
DOI : 10.1007/978-3-540-76900-2_5

S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, Security and privacy aspects of low-cost RFID systems, Proc. of SPC, pp.201-212, 2003.