A. Gildas-avoine, C. Lauradoux, and T. Martin, When Compromised Readers Meet RFID, Workshop on Information Security Applications ? WISA'09, pp.36-50, 2009.
DOI : 10.1007/978-3-642-10838-9_4

G. Avoine and P. Oechslin, RFID Traceability: A Multilayer Problem, Financial Cryptography ? FC'05, pp.125-140, 2005.
DOI : 10.1007/11507840_14

G. Avoine, Adversary Model for Radio Frequency Identification, Security and Cryptography Laboratory (LASEC), 2005.

A. Juels and S. Weis, Defining Strong Privacy for RFID, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp.342-347, 2007.
DOI : 10.1109/PERCOMW.2007.37

N. , Y. Nohara, S. Inoue, K. Baba, and H. Yasuura, Quantitative Evaluation of Unlinkable ID Matching Schemes, Workshop on Privacy in the Electronic Society ? WPES, pp.55-60, 2006.

M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic Approach to " Privacy-Friendly " Tags, RFID Privacy Workshop, 2003.

P. P. Peris-lopez, J. C. Hernandez-castro, J. M. Estevez-tapiador, and A. Ribagorda, An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks, Emerging Directions in Embedded and Ubiquitous Computing, pp.781-794, 2007.
DOI : 10.1007/978-3-540-77090-9_71

A. Shamir, SQUASH ??? A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags, Fast Software Encryption ? FSE 2008, pp.144-157, 2008.
DOI : 10.1007/978-3-540-71039-4_9

G. Tsudik and . Ya-trap, Yet Another Trivial RFID Authentication Protocol, International Conference on Pervasive Computing and Communications ? PerCom, 2006.
DOI : 10.1109/percomw.2006.152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2475

S. Vaudenay, On Privacy Models for RFID, Advances in Cryptology -Asiacrypt, pp.68-87, 2007.
DOI : 10.1007/978-3-540-76900-2_5