M. Akgün and M. U. , Extending an RFID Security and Privacy Model by Considering Forward Untraceability, STM 2010, pp.239-254
DOI : 10.1007/978-3-642-22444-7_16

C. Berbain, O. Billet, J. Etrog, and H. Gilbert, An efficient forward private RFID protocol, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.43-53, 2009.
DOI : 10.1145/1653662.1653669

O. Billet, J. Etrog, and H. Gilbert, Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher, FSE 2010, pp.55-74, 2010.
DOI : 10.1007/978-3-642-13858-4_4

M. Burmester, T. V. Le, B. D. Medeiros, and G. Tsudik, Universally Composable RFID Identification and Authentication Protocols, ACM Transactions on Information and System Security, vol.12, issue.4, 2009.
DOI : 10.1145/1513601.1513603

I. Coisel and T. Martin, Untangling RFID privacy models. ePrint Archive, p.636, 2011.
DOI : 10.1155/2013/710275

URL : http://doi.org/10.1155/2013/710275

J. Hermans, A. Pashalidis, F. Vercauteren, and B. Preneel, A New RFID Privacy Model, ESORICS 2011, pp.568-587, 2011.
DOI : 10.1007/978-3-642-23822-2_31

T. V. Le, M. Burmester, and B. D. Medeiros, Universally composable and forwardsecure RFID authentication and authenticated key exchange, pp.242-252, 2007.

C. Y. Ng, W. Susilo, Y. Mu, and R. Safavi, New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing, ESORICS 2009, pp.321-336, 2009.
DOI : 10.1007/978-3-540-39881-3_18

A. Juels and S. A. Weis, Defining strong privacy for RFID, IEEE, pp.342-347, 2007.
DOI : 10.1145/1609956.1609963

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Juels and S. A. Weis, Defining strong privacy for RFID, ACM TISSEC, vol.12, issue.17, 2009.
DOI : 10.1145/1609956.1609963

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. H. Lim and T. Kwon, Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer, ICICS 2006, pp.1-20, 2006.
DOI : 10.1007/11935308_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Moriyama, S. Matsuo, and M. Ohkubo, Relations among notions of privacy for RFID authentication protocols, ESORICS 2012, pp.661-678

K. Ouafi and R. C. Phan, Traceable Privacy of Recent Provably-Secure RFID Protocols, ACNS 2008, pp.479-489, 2008.
DOI : 10.1007/978-3-540-68914-0_29

M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic approach to privacy-friendly tags, 2003.

K. Ouafi and S. Vaudenay, Strong Privacy for RFID Systems from Plaintext-Aware Encryption, CANS 2012, pp.247-262, 2012.
DOI : 10.1007/978-3-642-35404-5_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Paise and S. Vaudenay, Mutual authentication in RFID, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.292-299, 2008.
DOI : 10.1145/1368310.1368352

S. Vaudenay, On Privacy Models for RFID, ASIACRYPT 2007, pp.519-535, 2007.
DOI : 10.1007/978-3-540-76900-2_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector et al., Building the Internet of Things Using RFID: The RFID Ecosystem Experience, IEEE Internet Computing, vol.13, issue.3, 2009.
DOI : 10.1109/MIC.2009.52