References
- Sarma, S., Weis, S., and Engels, D., "RFID Systems and Security and Privacy Implications," In Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2002, LNCS No. 2523, pp. 454-469, 2003
- EPCGLOBAL INC.: http://www.epcglobalinc.org
- Clarke, E.M. and Wing, J.M., "Formal Methods: State of the Art and Future Directions," ACM Computing Surveys (CSUR), Volume 28, Issue 4, pp. 626-643, 1996 https://doi.org/10.1145/242223.242257
- Boussinot, F. and de Simone, R.,"The ESTEREL language," In Proc.of the IEEE, Volume 79,Issue 9, pp. 1293-1304, 1991
- Ulrich S. and David L. Dill, "Parallelizing the Murϕ Verifier," Formal Methods in System Design, Volume 18, No.2, pp. 117-129, 2001 https://doi.org/10.1023/A:1008771324652
- Formal Systems Ltd. FDR2 User Manual, Aug. 1999
- Weis, S., Sarma, S., Rivest, R. and Engels, D., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," In 1st Intern. Conference on Security in Pervasive Computing (SPC), pp. 201-212, 2003
- Juels, A., "Privacy and Authentication in Low-cost RFID tags," In submission, Available at http://www. rsasecurity.com/rsalabs/staff/bios/ajuels/
- Weis, S., "Security and privacy in radiofrequency identification devices," Massachusetts Institute of Technology (MIT). Massachusetts, USA, 2003
- Chien, H.Y. and Chen, C.H., "Mutual Authenti- cation Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards," Computers Standards & Interfaces, Volume 29, Issue 2, pp. 254- 259, 2007 https://doi.org/10.1016/j.csi.2006.04.004
- Kosta, M. E., Hansen, M., and Gasson, M., "An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports," IFIP SEC, pp. 467- 472, 2007 https://doi.org/10.1007/978-0-387-72367-9_42
- Peris-Lopez, P., Hernandez-Castro, J. C., Estevez- Tapiador, J. M., and Ribagorda, A., "EMAP: An Efficient Mutual Authentication Protocol for Low- cost RFID Tags," OTM Federated Conferences and Workshop: IS Workshop, pp. 352-361, 2006 https://doi.org/10.1007/11915034_59
- Defend, B. and Juels, A., "Cryptanalysis of Two Lightweight RFID Authentication Schemes," International Workshop on Pervasive Computing and Communication Security PerSec (2007)
- Lowe, G., "Casper: A compiler for the analysis of security protocols," the 1997 IEEE Computer Security Foundations Workshop X, IEEE Computer Society, Silver Spring, MD, pp. 18-30, 1997
- Hoare, C.A.R., Communicating Sequential Processes, Prentice-Hall, 1985.
- Juels, A., "Minimalist Cryptography for RFID Tags," In Proc. of Security in Comm. Networks (SCN), LNCS, pp. 149-164, 2004
- Juels, A., Rivest, R.L., and Szydlo, M., "The Blocker Tag:?Selective Blocking of RFID tags for Consumer Privacy," In Proc. of the 10th ACM conference on Computer and communications security, pp. 103-111, 2003
- Golle, P., Jakobsson, M., Juels, A., and Syverson, P., "Universal Reencryption for Mixnets," RSA Conference Cryptographers Track (CT-RSA 2004), LNCS 2964, pp. 163-178, 2004
- Gaubatz, G., Kaps, J., and Sunar, B., "Public Keys Cryptography in Sensor Networks Revisited," the 1st European Workshop on Security in Ad-Hoc and Sensor Networks(ESAS 2004), pp. 2-18, 2005
- Perrig, A., et al., "SPINS : Security Protocols for Sensor Networks," Mobile Computing and Net- working 2001