When Compromised Readers Meet RFID, Workshop on Information Security Applications ? WISA'09, pp.36-50, 2009. ,
DOI : 10.1007/978-3-642-10838-9_4
RFID Traceability: A Multilayer Problem, Financial Cryptography ? FC'05, pp.125-140, 2005. ,
DOI : 10.1007/11507840_14
Adversary Model for Radio Frequency Identification, Security and Cryptography Laboratory (LASEC), 2005. ,
Defining Strong Privacy for RFID, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp.342-347, 2007. ,
DOI : 10.1109/PERCOMW.2007.37
Quantitative Evaluation of Unlinkable ID Matching Schemes, Workshop on Privacy in the Electronic Society ? WPES, pp.55-60, 2006. ,
Cryptographic Approach to " Privacy-Friendly " Tags, RFID Privacy Workshop, 2003. ,
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks, Emerging Directions in Embedded and Ubiquitous Computing, pp.781-794, 2007. ,
DOI : 10.1007/978-3-540-77090-9_71
SQUASH ??? A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags, Fast Software Encryption ? FSE 2008, pp.144-157, 2008. ,
DOI : 10.1007/978-3-540-71039-4_9
Yet Another Trivial RFID Authentication Protocol, International Conference on Pervasive Computing and Communications ? PerCom, 2006. ,
DOI : 10.1109/percomw.2006.152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2475
On Privacy Models for RFID, Advances in Cryptology -Asiacrypt, pp.68-87, 2007. ,
DOI : 10.1007/978-3-540-76900-2_5