1. Lecture Notes in Computer Science;K Rhee,2005
2. Lecture Notes in Computer Science;SM Lee,2005
3. Lecture Notes in Computer Science;J Lim,2008
4. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM2005), pp. 59–66. IEEE (2005)
5. Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, pp. 149–153. IEEE (2004)