1. [1] G. Avoine, Adversarial model for radio frequency identification, ePrint Archive, 2006/049, 2005.
2. [2] M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, “Relations among notions of security for public-key encryption schemes,” CRYPTO 1998, LNCS, vol.1462, pp.26-45, Springer, Heidelberg, 1998.
3. [3] O. Billet, J. Etrog, and H. Gilbert, “Lightweight privacy preserving authentication for rfid using a stream cipher,” FSE 2010, LNCS, vol.6147, pp.55-74, Springer Heidelberg, 2010.
4. [4] M. Burmester, T.V. Le, B.D. Medeiros, and G. Tsudik, “Universally composable RFID identification and authentication protocols,” ACM TISSEC 2009, vol.12, no.4, pp.21: 1-33, 2009.
5. [5] M. Burmester, T. van Le, and B. de Medeiros, “Provably secure ubiquitous systems: Universally composable RFID authentication protocols,” SecureComm 2006, pp.1-9. IEEE, 2006.