1. Enhancement of the RFID security method with ownership transfer;Chen,2009
2. RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards;Chen;International Journal of Network Security,2011
3. Examining indistinguishability-based proof models for key establishment protocols;Choo,2005
4. RFIDDOT: RFID delegation and ownership transfer made simple;Dimitriou,2008
5. An active attack against HB+ — a provably secure lightweight authentication protocol;Gilbert;IEEE Electronic Letters,2005