1. Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), pp. 92–101. ACM Press, New York (2005)
2. Avoine, G.: http://lasecwww.epfl.ch/~gavoine/rfid/
3. Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: Proc. IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2005). IEEE Computer Society Press, Los Alamitos (2005)
4. Burmester, M., de Medeiros, B., Motta, R.: Robust, Anonymous RFID Authentication with Constant Key-Lookup. In: Proc. ACM Symposium on Information, Computer and Communication Security (ASIACCS 2008), pp. 283–291. ACM Press, New York (2008)
5. Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006). IEEE Press, Los Alamitos (2006)