5[3]A.Juels:Yoking-Proofs for RFID Tags,Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops 2004
6[4]S.E.Sarma,S.A.Weis,D.W.Engels:Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2-9
7[5]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Engels:Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D.,Miler G.,Stephan W.,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201-212
8[6]A Juels.,R.L.Rivest,M.Szydlo:The blocker tag:Selective blocking of RFID tags for consumer Privacy.In:Proceeding of the 10th ACM Conference on Computer and Communication Security (CCS2003),Washington,DC,USA,2003,103-111
9[8]A Juels,R Pappu,S.Euros:Privacy Protection in RFID-enabled Banknotes,Financial Cryptography' 03,2003.134-145
10[9]J.Zhai,C.M.Park,and G.N.Wang:Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification.In:M.Gavrilova et al.Ed.Procedure ICCSA 2006,LNCS 3983,2006,296-305