1. Hongsongkiat, T., & Chongstitvatana, P. (2014). AES implementation for RFID tags: The hardware and software approaches. In International Computer Science and Engineering Conference (pp. 118–123).
2. Habibi, M. H., Alagheband, M. R., & Aref, M. R.(2011). Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. IFIP WG 11.2 International conference on information security theory and practice: Security and privacy of mobile devices in wireless communication (Vol. 6633, pp. 254–263). Springer.
3. Chang-She, M. A. (2011). Low cost RFID authentication protocol with forward privacy. Chinese Journal of Computers, 34(8), 1387–1398.
4. Xiao, F., Zhou, Y. J., Zhou, Y. X., et al. (2013). Provable secure mutual authentication protocol for RFID in the standard model. Journal on Communication, 34(4), 82–98.
5. Feng, X., Zhou, Y. J., Zhou, J. X., & Niu, X. X. (2013). Provable secure mutual authentication protocol for RFID in the standard model. Journal on Communications, 34(4), 82–87.