1 EPCGLOBAL, "http://www.epcglobalinc.org"
2 Golle, P., "Universal Reencryption for Mixnets" LNCS 163-178, 2004
3 Boussinot, F., "The ESTEREL language" 1293-1304, 1991
4 Juels, A., "The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy" 103-111, 2003
5 Weis, S., "Security and privacy in radiofrequency identification devices" Massachusetts Institute of Technology (MIT). Massachusetts 2003
6 Weis, S., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems" 201-212, 2003
7 Perrig, A., "SPINS : Security Protocols for Sensor Networks" Mobile Computing and Net- working 2001
8 Sarma, S., "RFID Systems and Security and Privacy Implications" LNCS 454-469, 2003
9 Gaubatz, G., "Public Keys Cryptography in Sensor Networks Revisited" 2-18, 2005
10 Ulrich S., "Parallelizing the Murϕ Verifier" 18 (18): 117-129, 2001
1 EPCGLOBAL, "http://www.epcglobalinc.org"
2 Golle, P., "Universal Reencryption for Mixnets" LNCS 163-178, 2004
3 Boussinot, F., "The ESTEREL language" 1293-1304, 1991
4 Juels, A., "The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy" 103-111, 2003
5 Weis, S., "Security and privacy in radiofrequency identification devices" Massachusetts Institute of Technology (MIT). Massachusetts 2003
6 Weis, S., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems" 201-212, 2003
7 Perrig, A., "SPINS : Security Protocols for Sensor Networks" Mobile Computing and Net- working 2001
8 Sarma, S., "RFID Systems and Security and Privacy Implications" LNCS 454-469, 2003
9 Gaubatz, G., "Public Keys Cryptography in Sensor Networks Revisited" 2-18, 2005
10 Ulrich S., "Parallelizing the Murϕ Verifier" 18 (18): 117-129, 2001
11 Chien, H.Y., "Mutual Authenti- cation Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards" 29 (29): 254-259, 2007
12 Juels, A., "Minimalist Cryptography for RFID Tags" LNCS 149-164, 2004
13 Juels, A., "In submission"
14 Clarke, E.M., "Formal Methods: State of the Art and Future Directions" 28 (28): 626-643, 1996
15 Formal Systems, "FDR2 User Manual" 1999
16 Peris-Lopez, P., "EMAP: An Efficient Mutual Authentication Protocol for Low- cost RFID Tags" 352-361, 2006
17 Defend, B., "Cryptanalysis of Two Lightweight RFID Authentication Schemes" 2007
18 Hoare, C.A.R., "Communicating Sequential Pro- cesses" Prentice-Hall 1985
19 Lowe, G., "Casper: A compiler for the analysis of security protocols" IEEE Computer Society, Silver Spring, MD 18-30, 1997
20 Kosta, M. E., "An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports" IFIP SEC 467-472, 2007