References
- Avoine, G. RFID Security & Privacy Lounge available at: http://www.avoine.net/rfid/ (accessed on 10/15/2012).
- Bárász, M. Boros, B. Ligeti, P. Lója, K. Nagy, D.A. (2007). Breaking LMAP. Conference on RFID Security.
- Kapoor, G. & Piramuthu, S. (2012). Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics-C, 42(2), 164–173.
- Li, T. & Wang, G. (2007). Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. 22nd IFIP TC-11 International Information Security Conference, Springer, Volume 232, pp 109–120.
- Ouafi, K. & Phan, R.C.-W. (2008). Privacy of Recent RFID Authentication Protocols. Information Security Practice and Experience, Lecture Notes in Computer Science, Volume 4991/2008, 263–277.
- Peris-Lopez, P. Hernandez-Castro, J.C. Tapiador, J.M.E. & Ribagorda, A. (2006a). M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. International Conference on Ubiquitous Intelligence and Computing (UIC'06), Springer LNCS 4159, pp. 912–923.
- Peris-Lopez, P. Hernandez-Castro, J.C. Tapiador, J.M.E. & Ribagorda, A. (2006b). LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags. Workshop on RFID Security..
- Piramuthu, S. (2008). Adaptive Framework for Collisions in RFID Tag Identification. Journal of Information & Knowledge Management, 7(1), 9–14.
- Mitrokotsa, A. Rieback, M.R. Tanenbaum, A.S. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers 12(5), 491–505.