1. Robust, anonymous RFID authentication with constant key-lookup;Burmester,2007
2. A logic of authentication;Burrows;ACM Trans Comput Syst (TOCS),1990
3. Attacks and improvements to an RFID mutual authentication protocol;Cai,2009
4. Consideration on the Brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol;Cho;Comput Math Appl,2012
5. A lightweight RFID protocol to protect against traceability and cloning attacks;Dimitriou,2005