1. Lecture notes in computer science;E Biham,2007
2. Bono S, Green M, Stubblefield A, Rubin A, Juels A, Szydlo M (2005) Security analysis of a cryptographically-enabled RFID device. In: Proceedings of the 14th USENIX security symposium, Baltimore
3. Lecture notes in computer science;GG de Koning,2008
4. Lecture notes in computer science;Y Desmedt,1988
5. Hancke G, Kuhn M (2005) An RFID distance bounding protocol. In: Conference on security and privacy for emerging areas in communication networks – SecureComm 2005, Athens