1. Avoine, G.: Radio frequency identification: adversary model and attacks on existing protocols. Technical Report LASEC REPORT-2005-001, September 2005
2. Bonen, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)
3. Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically enabled RFID device. In: McDaniel, P. (ed.) USENIX Security 05, pp. 1–16 (2005)
4. Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: long-term protection against break-ins. RSA CryptoBytes 1(3), 1–8 (1997)
5. Dolev, S., Kopeetsky, M.: Secure communication for RFIDs. Proactive information security within computational security. In: Eighth International Symposium on Stabilization, Safety, and Security of Distributed Systems, Dallas, USA (2006)