1. Batina, L., Lee, Y., Seys, S., Singele, D., Verbauwhede, I.: Privacy-preserving ECC-based grouping proofs for RFID. In: Burmester, M., Tsudik, G., Magliveras, S., Ili, I. (Eds.) Information Security, Lecture Notes in Computer Science, Vol. 6531. Heidelberg: Springer-Verlag, (2011). doi: 10.1007/978-3-642-18178-8_14 .
2. Chen, C.L., and Wu, C.Y., Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36(5):2849–2864, 2012. doi: 10.1007/s10916-011-9763-5 .
3. Chien, H.Y., Yang, C.C., Wu, T.C., Lee, C.F., Two RFID-based solutions to enhance inpatient medication safety. J.Med. Syst. 35 (3):369–375, 2011. doi: 10.1007/s10916-009-9373-7 .
4. Deursen, T.: 50 ways to break RFID privacy. In: Fischer-Hbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (Eds.) Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, Vol. 352, pp. 192–205. Springer-Verlag, Heidelberg (2011), doi: 10.1007/978-3-642-20769-3_16 .
5. Deursen, T., Mauw, S., Radomirovi, S.: Untraceability of RFID protocols. In: Onieva, J., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (Eds.) Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Lecture Notes in Computer Science, Vol. 5019, pp. 1–15. Springer-Verlag, Heidelberg (2008), doi: 10.1007/978-3-540-79966-5_1 .