1. Kim J., Yang C., Jeon J. (2007) A research on issues related to RFID security and privacy. In: Wang W. (eds) IFIP international federation for information processing, Volume 252, integration and innovation orient to E-society Volume 2. Springer, Boston
2. Chein, H. Y., Chen, C. H. (2007). Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In Computer Standards and Interfaces, vol. 29. Amsterdam: Elsevier.
3. Mitrokotsa, A., Rieback, M. R., Tanenbaum, A. S. (2008). Classification of RFID attacks. In Proceedings of the 2nd International Workshop on RFID Technology: Concepts, Applications, Challenges (IWRT’08), 10th International Conference on Enterprise Information Systems, Barcelona, Spain.
4. Choi, E. Y., Lee, D. H, Lim, J. I. (2009). Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. In Computer Standards & Interfaces, Volume 31, Issue 6.
5. Juels, A. (2005). Strengthening EPC tags against cloning. In ACM-Workshop on Wireless Security, WiSE.