1. Privacy and security in library RFID: issues, practices, and architectures;Molnar,2004
2. Improved privacy of the tree-based hash protocols using physically unclonable function;Bringer,2008
3. Reducing time complexity in RFID systems;Avoine,2006
4. A highly scalable RFID authentication protocol;Wu,2009
5. Scalable RFID systems: A privacy-preserving protocol with constant-time identification;Alomair;IEEE Trans. Parallel Distrib. Syst.,2012