J. H. Hoepman, E. Hubbers, B. Jacobs, M. Oostdijk, and R. Wichers-schreur, Crossing Borders: Security and Privacy Issues of the European e-Passport, In: IWSEC. Lecture Notes in Computer Science, vol.4266, pp.152-167, 2006.
DOI : 10.1007/11908739_11

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010.

I. Damgård and M. Ø. Pedersen, RFID Security: Tradeoffs between Security and Efficiency, pp.318-332, 2008.
DOI : 10.1007/978-3-540-79263-5_20

A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006.
DOI : 10.1109/JSAC.2005.861395

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.6789

M. Langheinrich, A survey of RFID privacy approaches, Personal and Ubiquitous Computing, vol.5, issue.1, pp.413-421, 2009.
DOI : 10.1007/s00779-008-0213-4

I. J. Kim, E. Y. Choi, and D. H. Lee, Secure Mobile RFID system against privacy and security problems, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), 2007.
DOI : 10.1109/SECPERU.2007.10

H. Zimmermann, OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980.
DOI : 10.1109/TCOM.1980.1094702

G. Avoine and P. Oechslin, RFID Traceability: A Multilayer Problem, In: Financial Cryptography. Lecture Notes in Computer Science, vol.3570, pp.125-140, 2005.
DOI : 10.1007/11507840_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.6964

G. P. Hancke, Eavesdropping Attacks on High-Frequency RFID Tokens, Workshop on RFID Security ? RFIDSec'08, 2008.
DOI : 10.3233/jcs-2010-0407

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9341

G. P. Hancke, Practical attacks on proximity identification systems (short paper), IEEE Symposium on Security and Privacy, pp.328-333, 2006.
DOI : 10.1109/sp.2006.30

B. Danev, T. S. Heydt-benjamin, and S. Capkun, Physical-layer identification of RFID devices, In: USENIX, pp.125-136, 2009.
DOI : 10.1145/2379776.2379782

T. Van-deursen and S. Radomirovi´cradomirovi´c, Algebraic Attacks on RFID Protocols, Lecture Notes in Computer Science, vol.5746, pp.38-51, 2009.
DOI : 10.1007/978-3-642-03944-7_4

D. Henrici and P. Müller, Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers, pp.149-153, 2004.

G. Avoine, Adversary model for radio frequency identification, EPFL, 2005.

T. Chothia and V. Smirnov, A Traceability Attack against e-Passports, In: Financial Cryptography. Lecture Notes in Computer Science, 2010.
DOI : 10.1007/978-3-642-14577-3_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1985

F. D. Garcia and P. Van-rossum, Modeling Privacy for Off-Line RFID Systems, In: CARDIS, pp.194-208, 2010.
DOI : 10.1007/978-3-642-12510-2_14

URL : https://hal.archives-ouvertes.fr/hal-01056106

F. D. Garcia, P. Van-rossum, R. Verdult, and R. W. Schreur, Wirelessly Pickpocketing a Mifare Classic Card, 2009 30th IEEE Symposium on Security and Privacy, pp.3-15, 2009.
DOI : 10.1109/SP.2009.6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2825

W. Teepe, In sneltreinvaart je privacy kwijt, Dutch). Privacy & Informatie, 2008.

C. Swenson, G. Manes, and S. Shenoi, Imaging and Analysis of GSM SIM Cards, In: IFIP Int. Conf. Digital Forensics, pp.205-216, 2005.
DOI : 10.1007/0-387-31163-7_17

C. Boyd and P. Forster, Time and date issues in forensic computing???a case study, Digital Investigation, vol.1, issue.1, pp.18-23, 2004.
DOI : 10.1016/j.diin.2004.01.002

H. Gilbert, M. Robshaw, and H. Sibert, Active attack against HB+: a provably secure lightweight authentication protocol, Electronics Letters, vol.41, issue.21, 2005.
DOI : 10.1049/el:20052622

T. Van-deursen and S. Radomirovi´cradomirovi´c, EC-RAC: Enriching a Capacious RFID Attack Collection, Lecture Notes in Computer Science, vol.6370, pp.75-90, 2010.
DOI : 10.1007/978-3-642-16822-2_8

P. Eckersley, How Unique Is Your Web Browser?, In: PETS, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

M. H. Bosworth, Loyalty cards: Reward or threat?, 2005.

T. Worldpanel, Tesco share turnaround (plus an update on grocery price inflation), 2009.