Alomair, B., Poovendran, R.: Privacy versus scalability in radio frequency identification systems. Computer Communications 33(18), 2155-2163 (2010)
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291-306. Springer, Heidelberg (2006) (Pubitemid 43986801)
Chen, H.B., Lee, W.B., Zhao, Y.H., Chen, Y.L.: Enhancement of the RFID security method with ownership transfer. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pp. 251-254. ACM (2009)
Dimitriou, T.: rfidDOT: RFID delegation and ownership transfer made simple. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1-8. ACM (2008)
Fernàndez-Mir, A., Castellà-Roca, J., Viejo, A.: Secure and Scalable RFID Authentication Protocol. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 231-243. Springer, Heidelberg (2011)
Fouladgar, S., Afifi, H.: An efficient delegation and transfer of ownership protocol for RFID tags. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria (2007)
Goebel, C., Tribowski, C., Gunther, O., Troeger, R., Nickerl, R.: RFID in the Supply Chain: How to Obtain a Positive ROI-The Case of Gerry Weber. In: 11th International Conference on Enterprise Information Systems (ICEIS 2009), Milan, Italy, vol. 10, pp. 95-102 (May 6, 2009)
Kapoor, G., Piramuthu, S.: Vulnerabilities in some recently proposed RFID ownership transfer protocols. In: 2009 First International Conference on Networks & Communications, pp. 354-357. IEEE (2009)
Langheinrich, M.: A survey of RFID privacy approaches. Personal and Ubiquitous Computing 13(6), 413-421 (2009)
Molnar, D., Soppera, A.,Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276-290. Springer, Heidelberg (2006) (Pubitemid 43986800)
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An Efficient and Secure RFID Security Method with Ownership Transfer. In: 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1090-1095. IEEE (2007)
Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1303-1312. Springer, Heidelberg (2005) (Pubitemid 43848806)
Sarma, S.E.: Towards the five-cent tag. Technical report (2001)
Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. In: Computer Communications (2010)
European Union. Commission recommendation of 12 may 2009 on the implementation of privacy and data protection principles in applications supported by radiofrequency identification. Technical Report Official Journal of the European Union (May 2009)
Yoon, E.J., Yoo, K.Y.: Two security problems of RFID security method with ownership transfer. In: IFIP International Conference on Network and Parallel Computing, NPC 2008, pp. 68-73. IEEE (2008)
Yu Ng, C., Susilo, W., Mu, Y., Safavi-Naini, R.: Practical RFID Ownership Transfer Scheme. Journal of Computer Security - Special Issue on RFID System Security (2010)