1. Anderson RJ, Bond M. The man-in-the-middle defense. Presented at security protocols workshop, March 2006. http://www.cl.cam.ac.uk/rja14/Papers/Man-in-the-Middle-Defence.pdf.
2. Distance bounding protocols. Advances in cryptology, EUROCYPT'93;Brands,1993
3. Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: the insecurity of 802.11. In: Proceedings of seventh annual international conference on mobile computing and networking, p. 180–89; July 2001.
4. Courtois NT, Nohl K, O'Neil S. Algebraic attacks on the crypto-1 stream cipher in mifare classic and oyster cards. Cryptology ePrint archive: report 2008/166, April 2008. http://eprint.iacr.org/2008/166.