1. An empirical study of UHF RFID performance;Buettner,2008
2. The evolution of RFID security;Rieback;IEEE Pervasive Computing,2006
3. S.C. Bono, M. Green, A. Stubblefield, A. Juels, A.D. Rubin, M. Szydlo, Security analysis of a cryptographically-enabled RFID device, in: SSYM’05: Proceedings of the 14th Conference on USENIX Security Symposium, USENIX Association, Berkeley, CA, USA, 2005, pp. 1–16.
4. Safe authentication protocol for secure USB memories;Lee;Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),2010
5. Security-by-contract-with-trust for mobile devices;Costa;Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),2010