1. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network;Cryptology and Network Security;2018
2. Impersonation Attack on RFID Authentication Protocol and its Countermeasures;Key Engineering Materials;2011-02
3. Practical Schemes for Privacy and Security Enhanced RFID;Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices;2010
4. Threats and Vulnerabilities of RFID and Beyond;Wireless Networks and Mobile Communications;2009-04-13
5. Authentication Protocols in RFID Systems;Wireless Networks and Mobile Communications;2009-04-13