On Privacy Models for RFID, Advances in Cryptology-ASIACRYPT, pp.68-87, 2007. ,
DOI : 10.1007/978-3-540-76900-2_5
Strong crypto for RFID tags-a comparison of lowpower hardware implementations, Proc. 2007 IEEE International Symposium on Circuits and Systems (ISCAS), pp.1839-1842, 2007. ,
Secure and Serverless RFID Authentication and Search Protocols, IEEE Transactions on Wireless Communications, vol.7, issue.4, pp.1400-1407, 2008. ,
DOI : 10.1109/TWC.2008.061012
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.6400
3PR : secure server-less search protocols for RFID, Proc. 2nd International Conference on Information Security and Assurance, pp.187-192, 2008. ,
DOI : 10.1109/isa.2008.70
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.3133
Secure and efficient tag searching in RFID systems using serverless search protocol, Int. J. Security and Its Applications, vol.2, issue.4, pp.57-66, 2008. ,
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.153-158, 2008. ,
DOI : 10.1109/EUC.2008.54
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments . Wireless Personal Communications, pp.65-79, 2009. ,
RFID tag search protocol preserving privacy of mobile reader holders, IEICE Electronics Express, vol.8, issue.2, pp.50-56, 2011. ,
DOI : 10.1587/elex.8.50