1. Atzori Luigi, Iera Antonio, Morabito Giacomo (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
2. Chien Hung-Yu (2009) Development and implementation of RFID Technology, chapter the study of RFID authentication protocols and security of some popular RFID tags, page 554. i-tech, Vienna
3. Hof C (2006) Rfid and identity management in everyday life: striking the balance between convenience, choice and control. Report IPOL/A/STOA/2006-22, ETAG (European Technology Assessment Group), European Parliament, Strasbourg
4. Benssalah M, Djeddou M, Drouiche K (2012) RFID authentication protocols based on ECC encryption schemes. In: 2012 IEEE international conference on RFID-technologies and applications, RFID-TA 2012, Nice, France, November 5–7, 2012, pages 97–100
5. Chou J-S, Chen Y, Wu C-L, Lin C-F (2011) An efficient rfid mutual authentication scheme based on ecc. Cryptology ePrint Archive, Report 2011/418