On the reliability of electronic payment systems, IEEE Transactions on Software Engineering, vol.22, issue.5, pp.294-301, 1996. ,
DOI : 10.1109/32.502222
Privacy ussues in RFID banknotes protection schemes, 6th CARDIS, pp.43-48, 2004. ,
Reducing Time Complexity in RFID Systems, In Selected Areas in Cryptography Lecture Notes in Computer Science, vol.3897, pp.291-306, 2005. ,
DOI : 10.1007/11693383_20
When Compromised Readers Meet RFID, Workshop on RFID Security (RFIDsec), pp.32-48, 2009. ,
DOI : 10.1007/978-3-642-10838-9_4
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, ASIACRYPT, pp.531-545, 1976. ,
CBC MACs for arbitrary-length messages: The three-key constructions, In CRYPTO LNCS 1880, pp.197-215, 2000. ,
Advanced security mechanisms for machine readable travel documents ? extended access control (eac), 2006. ,
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005. ,
DOI : 10.1109/SECURECOMM.2005.4
Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience, 2nd Ann. Conf. on Privacy, Security and Trust, pp.89-101, 2004. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. on Inf. Theory, vol.31, issue.4, pp.469-472, 1985. ,
RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy Magazine, vol.3, issue.3, pp.34-43, 2005. ,
DOI : 10.1109/MSP.2005.78
Universal reencryption for mixnets, RSA Conf. LNCS 2964, pp.23-27, 2004. ,
Crossing Borders: Security and Privacy Issues of the European e-Passport, 1st IWSEC, pp.152-167, 2006. ,
DOI : 10.1007/11908739_11
Practical Schemes for Privacy and Security Enhanced RFID, p.1257, 2009. ,
DOI : 10.1007/978-3-540-39881-3_18
URL : https://hal.archives-ouvertes.fr/hal-01059139
RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006. ,
DOI : 10.1109/JSAC.2005.861395
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, 7th Int, pp.103-121, 2003. ,
DOI : 10.1007/978-3-540-45126-6_8
Defining strong privacy for RFID, 5th Ann. IEEE Int. Cont. on Pervasive Computing and Communications Workshops ? Pervasive RFID/NFC Technology and Applications (PerTec), pp.342-347, 2007. ,
Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.210-219, 2004. ,
DOI : 10.1145/1030083.1030112
Suggested algorithms for light-weight cryptography, Tech. rep., ECRYPT, 2006. ,
A platform for rfid security and privacy administration, USENIX, pp.89-102, 2006. ,
Rfid systems, security & privacy implications (white paper), 2002. ,
DOI : 10.1007/3-540-36400-5_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4948
Critical RFID Privacy-Enhancing Technologies, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.56-62, 2009. ,
DOI : 10.1109/MSP.2009.31
The resurrecting duckling -what next?, 8th Security Protocols Workshop, pp.204-214, 2000. ,
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Procotols, 7th Int. Workshop, pp.172-194, 1999. ,
DOI : 10.1007/10720107_24
On the security of ElGamal based encryption, LNCS 1431, pp.117-134, 1998. ,
DOI : 10.1007/BFb0054019
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, 1st SPC, pp.201-212, 2003. ,
DOI : 10.1007/978-3-540-39881-3_18