1. Avoine, G.: Security and privacy in RFID systems. Online bibliography, Available at: http://lasecwww.epfl.ch/~gavoine/rfid/
2. Lecture Notes in Computer Science;G. Avoine,2005
3. Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security – PerSec 2005, Kauai Island, Hawaii, USA, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)
4. Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland, USA, July-August 2005, pp. 1–16. USENIX (2005)
5. d’Hont, S. (ed.): International news letter of the TI RFID group. Electronic Newsletter (20) (November 2000)