1. Avoine, G.: Radio Frequency Identification: Adversary Model and Attacks on Existing Protocols, Technical Report LASES-REPORT-2005-001 (September 2005)
2. Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security Analysis of a Cryptographically Enabled RFID Device. In: McDaniel, P. (ed.) USENIX Security 2005, pp. 1–16 (2005)
3. Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive Security: Long-term Protection Against Break-ins. RSA CryptoBytes 3(1), 1–8 (1997)
4. Goossens, R., Lambi, F.: RFID Society Newsletter (May 2005), http://informationweek.com/story/showArticle.jhtml?articleID=163101002
5. Juels, A.: Strengthening EPC Tags Against Cloning. In: ACM Workshop on Wireless Security, pp. 67–76 (2005)