[1] D. Heyden, "RFID Applications," Available: http://www.fibre2fashion.com/industry-article/11/1023/rfid applications1.asp.
[2] S. Maharjan, "RFID and IOT: An overview," Simula Research Laboratory University of Oslo, 2010.
[3] L. Yang, P. Yu, W. Bailing, Q. Yun, B. Xuefeng, and Y. Xinling, "Hash-based RFID Mutual Authentication Protocol," International Journal of Security & Its Applications, vol. 7, no. 3, pp. 1738-9976, 2013.
[4] B. Song and C. J. Mitchell, "Scalable rfid security protocols supporting tag ownership transfer," Comput. Commun., vol. 34, pp. 556-566, 2011.
[5] A. Juels, "RFID security and privacy: A research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, p. 381-394, 2006.
[6] A. Juels, and S.A Weis, "Defining strong privacy for RFID," in Proceedings of PerCom'07, pp. 342-347, 2006.
[7] B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Scalable RFID systems: a privacy-preserving protocol with constant-time identification," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1536-1550, 2012.
[8] K. Ouafi, "Security and privacy in RFID systems," PhD Thesis, Ecole Polytechnique Federale DE Lausanne, 2008.
[9] M. R. Alagheband, and M. R. Aref, "Simulation-based traceability analysis of RFID authentication protocols," Wireless Personal Communications, vol. 77, no. 2, pp. 1020-1038, 2014.
[10] B. Hameed, I. Khan, F. Durr, and K. Rothermel, "An RFID based consistency management framework for production monitoring in a smart real-time factory," in 2nd International Conference on the Internet of Things (IoT), Tokyo, 2010.
[11] D. He, and Sh. Zeadally, "An analysis of RFID authentication schemes for Internet of things in healthcare environment using elliptic curve cryptography," IEEE Internet of Things Journal, vol. 2, no. 1, pp. 72 - 83, 2015.
[12] G. Avoine and X. Carpent, "Yet another ultra-lightweight authentication protocol that is broken," in Workshop on RFID Security-RFID-Sec'12, Nijmegen, 2012.
[13] M. Asadpour, and M. T. Dashti, "A privacy-friendly RFID protocol using reusable anonymous tickets," in 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha , 2011.
[14] Z. Sohrabi-Bonab, M. Alagheband, and M. R. Aref, "Traceability analysis of quadratic residue-based RFID authentication protocols," in Eleventh Annual International Conference on Privacy, Security and Trust (PST), Tarragona , 2013.
[15] M. R. Alagheband, and M. R. Aref, "Unified privacy analysis of new founded RFID authentication protocols," Security and Communication Networks, vol. 6, no. 8, pp. 999-1009, 2013.
[16] M. H. Habibi, M. R. Aref, and Di Ma, "Addressing flaws in RFID authentication protocols," Progress in Cryptology, INDOCRYPT 2011, LNCS 7107, vol. 7, p. 216-235, 2011.
[17] P. Babvey, H. A. Yajam, and T. Eghlidos, "Security analysis of SKI protocol," in 11th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, 2014.
[18] "EPC global Inc.," Available: http://www.epcglobalinc.org.
[19] H. Y. Chien, and C. H. Chen, "Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards," Computer Standards & Interfaces, vol. 29, no. 2, pp. 254-259, 2007.
[20] E.-J. Yoon, "Improvement of the securing RFID systems conforming to epc class 1 generation 2 standard," Expert Syst. Appl., vol. 39, no. 11, p. 1589-1594, 2012.
[21] M.H. Habibi, M. R. Alaghband, and M. R. Aref, "Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard," in Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Springer, 2011, pp. 254-263.
[22] T. C. Yeh, Y. J. Wanga, T. Ch. Kuo, and S. S. Wanga, "Securing RFID systems conforming to EPC Class 1 Generation 2 standard," Expert Systems with Applications, vol. 37, p. 7678-7683, 2010.
[23] F. Xiao, Y. Zhou, J. Zhou, H. Zhu, and X. Niu, "Security protocol for RFID system conforming to EPC-C1G2 standard," Journal of Computers, vol. 8, no. 3, pp. 605-612, 2013.
[24] M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, J. C Hernandez-Castro, "Weaknesses in another Gen2-based RFID authentication protocol," in IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2012.
[25] D. N. Duc, J. Park, H. Lee, and K. Kim, "Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning," in Symposium on Cryptography and Information Security (CSIS), pp. 17-20, 2006.
[26] S. Karthikeyan, and M. Nesterenko, "RFID security without extensive cryptography," in 3rd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN), pp. 63-67, 2005.
[27] S. Vaudenay, "On privacy models for RFID," in ASIACRYPT 2007, LNCS 4833, pp. 68-87., 2007.
[28] I. Coisel, and T. Martin, "Untangling RFID privacy models," Journal of Computer Networks and Communications, pp. 1-26, 2013, doi:10.1155/2013/710275.
[29] G. Avoine, "Adversarial model for radio frequency identification," Cryptology ePrint Archive, report 2005/049. http://eprint.iacr.org/2005/049, 2005.
[30] C. H. Lim, and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer," in Proceedings of ICICS '06, LNCS 4307, pp. 1-20, 2006.
[31] K. Ouafi and R. C.-W. Phan, "Privacy of recent RFID authentication protocols," in 4th International Conference on Information Security Practice and Experience (ISPEC), Springer, 2008.
[32] R. H. Deng, Y. Li, M. Yung, and Y. Zhao, "A new framework for RFID privacy," in 15th European Symposium on Research in Computer Security (ESORICS), Athens, 2010.
[33] D. Moriyama, S. Matsuo, and M. Ohkubo, "Relation among the security models for RFID authentication," in 17th European symposium on research in computer security (ESORICS), pp. 661-678, 2012.
[34] M. Safkhani, N. Bagheri, S. K. Sanadhya, and M. Naderi, "Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol," http://eprint.iacr.org/2011/426.pdf, 2011.
[35] A. Mohammadali, Z. Ahmadian, and M. R. Aref, "Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard," IACR Cryptology ePrint Archive, vol. 66, pp. 1-9, 2013.
[36] K. Baghery, B. Abdolmaleki, B. Akhbari, and M. R. Aref, "Privacy analysis and improvements of two recent RFID authentication protocols," in 11th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, 2014.
[37] S.-P. Wang, Q.-M. Ma, Y.- L. Zhang, and Y.-S. Li, "A HMAC-Based RFID Authentication Protocol," in 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC), 2010.
[38] J.-S.Cho, S.-S. Yeo, and S. K. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value," Computer Communication, vol. 34, pp. 391-397, 2011.
[39] J. Cho, S-C. Kim, and S. K. Kim, "Hash-based RFID tag mutual authentication scheme with retrieval efficiency," in 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011.
[40] S. W. Jung, and S. Jung, "HMAC-based RFID authentication protocol with minimal retrieval at server," The Fifth International Conference on Evolving Internet, pp. 52-55, 2013.
[41] Y. C. Huang, and J. R. Jiang, "Ultra lightweight RFID reader-tag mutual authentication revisited," in IEEE International Conference on Mobile Services (MS), New York, 2015.
[42] D. Z. Sun, and J. D. Zhong, "A hash-based RFID security protocol for strong privacy protection," IEEE Transactions on Consumer Electronics, vol. 58, no. 4, pp. 1246-1252, 2012.
[43] B. Abdolmaleki, K. Baghery, B. Akhbari, and M. R. Aref, "Attacks and improvements on two new-found RFID authentication protocols," in 7th International Symposium on Telecommunications (IST), Tehran, 2014.