S. Vaudenay, On Privacy Models for RFID, Advances in Cryptology-ASIACRYPT, pp.68-87, 2007.
DOI : 10.1007/978-3-540-76900-2_5

M. Feldhofer and J. Wolkerstorfer, Strong crypto for RFID tags-a comparison of lowpower hardware implementations, Proc. 2007 IEEE International Symposium on Circuits and Systems (ISCAS), pp.1839-1842, 2007.

C. Tan, B. Sheng, and Q. Li, Secure and Serverless RFID Authentication and Search Protocols, IEEE Transactions on Wireless Communications, vol.7, issue.4, pp.1400-1407, 2008.
DOI : 10.1109/TWC.2008.061012

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.6400

S. I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, 3PR : secure server-less search protocols for RFID, Proc. 2nd International Conference on Information Security and Assurance, pp.187-192, 2008.
DOI : 10.1109/isa.2008.70

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.3133

S. I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, Secure and efficient tag searching in RFID systems using serverless search protocol, Int. J. Security and Its Applications, vol.2, issue.4, pp.57-66, 2008.

T. Y. Won, J. Y. Chun, and D. H. Lee, Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.153-158, 2008.
DOI : 10.1109/EUC.2008.54

. E. Md, F. Hoque, S. I. Rahman, J. H. Ahamed, and . Park, Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments . Wireless Personal Communications, pp.65-79, 2009.

L. J. Chun, J. Y. Hwang, and D. H. Lee, RFID tag search protocol preserving privacy of mobile reader holders, IEICE Electronics Express, vol.8, issue.2, pp.50-56, 2011.
DOI : 10.1587/elex.8.50