References
1. Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A., Yung, M.
(eds.). In: Proc. of the Ninth Int’l Conf. on Financial Cryptography and Data Security
(FC’05), Lecture Notes in Computer Science, Vol. 3570. (2005) 125–140
2. Ayoade, J., Saxby, S.: Roadmap for Solving Security and Privacy Concerns in RFID Systems.
In: Computer Law and Security Report (2007)
3. Center, A.I.: 900 MHz Class 0 Radio Frequency (RF) Identification Tag Specification. In:
Draft, www.epcglobalinc.org/standards/specs/900 MHz Class 0 RFIDTag Specification.pdf,
(2003)
4. DN-Systems: BBC Reports on Cloning of the new e-passport. In: http://www.dn-
systems.de/press/document.2007-01-04.2112016470, (2007)
5. Bolotnyy, L., Robins, G.: Physically Unclonable Function-Based Security and Privacy in
RFID Systems. In: Proc. of PerCom’07. New York, USA (2007) 211–220
6. CDT: CDT Working Group on RFID: Privacy Best Practices for Deployement of RFID
Technology. In: Interim Draft, http://www.cdt.org/privacy/20060501rfid-best-practices.php,
(2006)
7. Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning
Attacks. In: Proc. of IEEE Conf. on Security and Privacy for Emerging Areas in Communi-
cation Networks, (2005)
8. Emvelope: Products. In: http://www.emvelope.com/products. (2008)
9. EPCGlobal: Guidelines on EPC for Consumer Products. In:
http://www.epcglobalinc.org/public/ppsc guide/, (2005)
10. EPCGlobal: Class-1 generation-2 UHF RFID Protocol for Communications at 860MHz-960
Mhz. In: EPC Radio-Frequency Identity Protocols, Vol. 1.1.0, (2005)
11. Fedhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems
Using the AES Algorithm. In: Proc. of Cryptographic Hardware and Embedded Systems
(CHES’04), Vol. 3156. Lecture Notes in Computer Science. (2004) 357–370
12. Fishkin, K., Roy, S., Jiang, B.: Some Methods for Privacy in RFID Communication. In: Proc.
of the 1st European Workshop on Security (2004) 42–53
13. Friedl, S.: SQL Injection attacks by example. In: http://www.unixwiz.net/techtips/sql-
injection.html, (2007)
14. Garfinkel, S., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed
Solutions. In: IEEE Security & Privacy, Vol. 3. (2005) 34–43
15. Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Proc. of the 1st Int’l Conf.
on Security and Privacy for Emerging Areas in Communications Networks (SecureComm
2005) (2005) 67–73
16. ICAO. ICAO Document 9303. In: http://mrtd.icao.int/content/view/33/202, (2006)
17. Inoue, S., Yasuura, H.: RFID Privacy Using User-Controllable Uniqueness. In: Proc. of RFID
Privacy Workshop. MIT, Massachusetts, USA (2003)
18. Juels, A.: Minimalist Cryptography for Low-cost RFID Tags. In: Proc. of the 4th Conf. on
Security in Communication Networks (SCN’04), Vol. 3352.Lecture Notes in Computer Sci-
ence. Springer-Verlag (2004) 149–164
19. Juels, A.: Stengthening EPC Tags Against Cloning. In: Proc. of ACM Workshop on Wireless
Security (WiSe’05). ACM Press (2005) 67–76
20. Juels, A., Rivest, R.,Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Con-
sumer Privacy. In: Proc. of the 10th ACM Conf. on Computer and Communication Security.
(2003) 103–111
21. Karjoth, G., Moskowitz, P.A.: Disabling RFID Tags with Visible Confirmation: Clipped Tags
are Silenced. In: Atluri, V., di Vimercanti, S.D.C., Dingledine, R. (eds). In: Proc. of the 2005
ACM Workshop on Privacy in the Electronic Society (WPES 2005). (2005) 27–30
85