1. T. van Deursen, S. Mauw, S. Radomirović, P. Vullers, Secure Ownership and Ownership Transfer in RFID Systems, in: 14th European Symposium on Research in Computer Security – ESORICS 2009, 2009, pp. 637–654.
2. G. Avoine, Adversarial Model for Radio Frequency Identification, Cryptology ePrint Archive, Report 2005/049.
3. S. Vaudenay, On privacy models for RFID, in: Advanced in Cryptology – ASIACRYPT 2007 (LNCS 4833), vol. 4833, 2007, pp. 68–87.
4. J. Hermans, A. Pashalidis, F. Vercauteren, B. Preneel, A new RFID privacy model, in: European Symposium on Research in Computer Security (ECORICS) 2009 (LNCS 6879), vol. 6879, 2011, pp. 568–587.
5. L. Kulseng, Z. Yu, Y. Wei, Y. Guan, Lightweight secure search protocols for low-cost RFID systems, in: 2009 29th IEEE International Conference on Distributed Computing Systems, 2009, pp. 40–48.