Crossing Borders: Security and Privacy Issues of the European e-Passport, In: IWSEC. Lecture Notes in Computer Science, vol.4266, pp.152-167, 2006. ,
DOI : 10.1007/11908739_11
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010. ,
RFID Security: Tradeoffs between Security and Efficiency, pp.318-332, 2008. ,
DOI : 10.1007/978-3-540-79263-5_20
RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006. ,
DOI : 10.1109/JSAC.2005.861395
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.6789
A survey of RFID privacy approaches, Personal and Ubiquitous Computing, vol.5, issue.1, pp.413-421, 2009. ,
DOI : 10.1007/s00779-008-0213-4
Secure Mobile RFID system against privacy and security problems, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), 2007. ,
DOI : 10.1109/SECPERU.2007.10
OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980. ,
DOI : 10.1109/TCOM.1980.1094702
RFID Traceability: A Multilayer Problem, In: Financial Cryptography. Lecture Notes in Computer Science, vol.3570, pp.125-140, 2005. ,
DOI : 10.1007/11507840_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.6964
Eavesdropping Attacks on High-Frequency RFID Tokens, Workshop on RFID Security ? RFIDSec'08, 2008. ,
DOI : 10.3233/jcs-2010-0407
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9341
Practical attacks on proximity identification systems (short paper), IEEE Symposium on Security and Privacy, pp.328-333, 2006. ,
DOI : 10.1109/sp.2006.30
Physical-layer identification of RFID devices, In: USENIX, pp.125-136, 2009. ,
DOI : 10.1145/2379776.2379782
Algebraic Attacks on RFID Protocols, Lecture Notes in Computer Science, vol.5746, pp.38-51, 2009. ,
DOI : 10.1007/978-3-642-03944-7_4
Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers, pp.149-153, 2004. ,
Adversary model for radio frequency identification, EPFL, 2005. ,
A Traceability Attack against e-Passports, In: Financial Cryptography. Lecture Notes in Computer Science, 2010. ,
DOI : 10.1007/978-3-642-14577-3_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1985
Modeling Privacy for Off-Line RFID Systems, In: CARDIS, pp.194-208, 2010. ,
DOI : 10.1007/978-3-642-12510-2_14
URL : https://hal.archives-ouvertes.fr/hal-01056106
Wirelessly Pickpocketing a Mifare Classic Card, 2009 30th IEEE Symposium on Security and Privacy, pp.3-15, 2009. ,
DOI : 10.1109/SP.2009.6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2825
In sneltreinvaart je privacy kwijt, Dutch). Privacy & Informatie, 2008. ,
Imaging and Analysis of GSM SIM Cards, In: IFIP Int. Conf. Digital Forensics, pp.205-216, 2005. ,
DOI : 10.1007/0-387-31163-7_17
Time and date issues in forensic computing???a case study, Digital Investigation, vol.1, issue.1, pp.18-23, 2004. ,
DOI : 10.1016/j.diin.2004.01.002
Active attack against HB+: a provably secure lightweight authentication protocol, Electronics Letters, vol.41, issue.21, 2005. ,
DOI : 10.1049/el:20052622
EC-RAC: Enriching a Capacious RFID Attack Collection, Lecture Notes in Computer Science, vol.6370, pp.75-90, 2010. ,
DOI : 10.1007/978-3-642-16822-2_8
How Unique Is Your Web Browser?, In: PETS, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
Loyalty cards: Reward or threat?, 2005. ,
Tesco share turnaround (plus an update on grocery price inflation), 2009. ,