S. Bellovin and W. Cheswick, Privacy-Enhanced Searches Using Encrypted Bloom Filters, Cryptology ePrint Archive Report, p.22, 2004.

E. Blass, K. Elkhiyaoui, and R. Molva, Tracker: Security and Privacy for RFIDbased Supply Chains, Proceedinsg of the 18th Network and Distributed System Security Symposium, pp.455-472, 2011.

B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Blum, P. Feldman, and S. Micali, Non-interactive zero-knowledge and its applications, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.103-112, 1988.
DOI : 10.1145/62212.62222

A. Broder and M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2003.
DOI : 10.1080/15427951.2004.10129096

J. Camenisch and G. Zaverucha, Private Intersection of Certified Sets, Proceedings of the International Conference on Financial Cryptography and Data Security, pp.108-127, 2009.
DOI : 10.1007/978-3-540-45146-4_19

D. Dachman-soled, T. Malkin, M. Raykova, and M. Yung, Efficient Robust Private Set Intersection, Proceedings of the 7th International Conference on Applied Cryptography and Network Security, pp.125-142, 2009.
DOI : 10.1109/SFCS.1982.38

E. De-cristofaro, J. Kim, and G. Tsudik, Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model, Proceedings of ASIACRYPT, pp.213-231, 2010.
DOI : 10.1007/978-3-642-17373-8_13

M. Eurich, N. Oertel, and R. Boutellier, The impact of perceived privacy risks on organizations??? willingness to share item-level event data across??the??supply chain, Electronic Commerce Research, vol.48, issue.9, pp.3-4, 2010.
DOI : 10.1093/acprof:oso/9780199266241.001.0001

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of CRYPTO, pp.186-194, 1986.
DOI : 10.1007/3-540-47721-7_12

K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2003.
DOI : 10.1002/9780470665121

M. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, Proceedings of EUROCRYPT, pp.1-19, 2004.
DOI : 10.1007/978-3-540-24676-3_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

. Fujitsu, Fujitsu Develops World's First 64KByte High-Capacity FRAM RFID Tag for Aviation Applications. Press Release Available at http://www.fujitsu.com/global, 2008.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Goh, Secure Indexes, Cryptology ePrint Archive Report, vol.216, 2003.

O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM, vol.38, issue.3, pp.690-728, 1991.
DOI : 10.1145/116825.116852

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

J. Groth and Y. Ishai, Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle, Proceedings of EUROCRYPT, pp.379-396, 2008.
DOI : 10.1007/978-3-540-78967-3_22

C. Hazay and Y. Lindell, Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries, Proceedings of the 5th Conference on Theory of Cryptography, pp.155-175, 2008.
DOI : 10.1007/978-3-540-78524-8_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Katz and Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols, 2007.

F. Kerschbaum and N. Oertel, Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting, Proceedings of the 6th Workshop on RFID Security, pp.124-137, 2010.
DOI : 10.1007/978-3-642-16822-2_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Kissner and D. Song, Privacy-Preserving Set Operations, Proceedings of CRYPTO, pp.241-257, 2005.
DOI : 10.1007/11535218_15

M. Lehtonen, F. Michahelles, and E. Fleisch, How to detect cloned tags in a reliable way from incomplete RFID traces, 2009 IEEE International Conference on RFID, pp.257-264, 2009.
DOI : 10.1109/RFID.2009.4911190

Y. Li and X. Ding, Protecting RFID communications in supply chains, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.234-241, 2007.
DOI : 10.1145/1229285.1229318

R. Nojima and Y. Kadobayashi, Cryptographically Secure Bloom-Filters, Transactions on Data Privacy, vol.2, pp.131-139, 2009.

N. Oertel, Tracking based product authentication: Catching intruders in the supply chain, Proceedings of the 17th European Conference on Information Systems, 2008.

K. Ouafi and S. Vaudenay, Pathchecker: an RFID Application for Tracing Products in Suply-Chains, Proceedings of the 5th Workshop on RFID Security, 2009.

B. Santos and L. Smith, RFID in the supply chain, Communications of the ACM, vol.51, issue.10, pp.127-131, 2008.
DOI : 10.1145/1400181.1400209

T. Sander, A. Young, and M. Yung, Non-Interactive CryptoComputing For NC1, Proceedings of the 40th Symposium on Foundations of Computer Science, pp.554-567, 1999.
DOI : 10.1109/sffcs.1999.814630

S. Sarma, D. Brock, and D. Engels, Radio frequency identification and the electronic product code, IEEE Micro, vol.21, issue.6, pp.50-54, 2001.
DOI : 10.1109/40.977758

T. Staake, F. Thiesse, and E. Fleisch, Extending the EPC Network ? The Potential of RFID in Anti-Counterfeiting, Proceedings of the 20th ACM Symposium on Applied Computing, pp.1607-1612, 2005.

M. Waldbaum and X. Nguyen, Using Creativity to Fight a $60 Billion Consumer Problem ? Counterfeit Goods, Loyola Chicago Consumer Law Review, vol.10, issue.1, p.88, 1998.

D. Zanetti, L. Fellmann, and S. Capkun, Privacy-preserving clone detection for RFID-enabled supply chains, 2010 IEEE International Conference on RFID (IEEE RFID 2010), pp.37-44, 2010.
DOI : 10.1109/RFID.2010.5467257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=