1. 22C3 (2007). RFID Zapper. https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper(EN)_77f3.html . Accessed July 2009.
2. Lecture notes in computer science, security and cryptology;G Avoine,2005
3. Ayoade, J. (2007). Privacy and RFID systems, roadmap for solving security and privacy concerns in RFID systems. Computer Law & Security Report, 23, 555–561.
4. Center for Democracy & Technology (2006). CDT working group on RFID: Privacy best practices for deployement of RFID technology. Interim Draft. http://www.cdt.org/privacy/20060501rfid-best-practices.php . Accessed July 2009.
5. Desmedt, Y. (2006). Major security problems with the “unforgeable” (Feige-)Fiat-Shamir proofs for identity and how to overcome them. In Proceedings of the 6th worldwide congress on computer and communications security and protection (Securicomm’88), March 1988 (pp. 141–159). Paris, France.