1. Security and privacy in RFID and applications in telemedicine;Xiao;IEEE Communication Magazine,2006
2. L. He, Y. Gan, N.-N. Li, Z.-Y. Cai, A security-provable authentication and key agreement protocol in RFID system, in: International Conference on Wireless Communications, Networking and Mobile Computing 2007 (WiCom 2007), 21–25 September, 2007, pp. 2078–2080.
3. S. Weis, S. Sarma, R. Rivest, D. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: 1st International Conference on Security in Pervasive Computing (SPC), 12–14 March, 2003.
4. H.Y. Chien, Secure access control schemes for RFID systems with anonymity, in: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006, p. 96.
5. T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005, pp. 59–66.