4[3]A.Juels:Yoking-Proofs for RFID Tags,Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops 2004
5[4]S.E.Sarma,S.A.Weis,D.W.Engels:Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2-9
6[5]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Engels:Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D.,Miler G.,Stephan W.,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201-212
7[6]A Juels.,R.L.Rivest,M.Szydlo:The blocker tag:Selective blocking of RFID tags for consumer Privacy.In:Proceeding of the 10th ACM Conference on Computer and Communication Security (CCS2003),Washington,DC,USA,2003,103-111
8[8]A Juels,R Pappu,S.Euros:Privacy Protection in RFID-enabled Banknotes,Financial Cryptography' 03,2003.134-145
9[9]J.Zhai,C.M.Park,and G.N.Wang:Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification.In:M.Gavrilova et al.Ed.Procedure ICCSA 2006,LNCS 3983,2006,296-305
10[10]S.E.Sarma,S.A Weis.,D.W.Engels:RFID systems and security and privacy implications.In:Kaliski B.S.,Koc C.K.,Paar C.eds..Proceedings of the 4th International Work-shop on Crypto graphic Hardware and Embedded Systems (CHES2002).Lectures Notes in Computer Science2523.Bedim Springer-Verlag,2003,454-469