14J. Vossaert et al.namely a personalized Web service, an information retrieval service and a locker service. However, we showed that the design is xible enough to add new services. Typical examples are entrance control and consumption services.References1. Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication 24(2) (2006) 2. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of LowCost radio frequency identiation systems. In: Hutter, D., M ller, G., Stephan, u W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 210�12. Springer, Heidelberg (2004) 3. Ohkubo, M., Suzuki, K., Kinoshita, S.: Eient Hash-Chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004) 4. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210�19. ACM Press, New York (2004) 5. Hogben, G., Naumann, I.: Privacy features of european eID card speciations. Tech. rep., ENISA (2009) 6. Institute for Applied Information Processing and Tu Graz Communications: IAIK: JCE-ME, http://jce.iaik.tugraz.at/ 7. Legion of the bouncy castle: The bouncy castle crypto APIs, http://www.bouncycastle.org/ 8. Institute for Applied Information Processing and Tu Graz Communications: Crypto software for microcontrollers, http://jce.iaik.tugraz.at/sic/products/ crypto software for microcontrollers 9. Hoepman, J.-H., Joosten, R.: Practical schemes for privacy & security enhanced r. CoRR, vol. abs/0909.1257 (2009) 10. Pu Public, X., Oswald, E.: Suggested algorithms for light-weight cryptography editor (2006) 11. Dolev, D., Yao, A.C.: On the security of public key protocols. In: SFCS 1981: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, Washington, DC, USA, pp. 350�57. IEEE Computer Society, Los Alamitos (1981) 12. Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with contextaware communications. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp. 479�90. ACM, New York (2008)