[1]R. Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” In Proceedings of the IEEE Computer Society, Vol. 7, No. 3, pp. 27-33, 2005.
[2]Wal-Mart Details RFID Requirement, available at http://www.rfidjournal.com/article/article/view/642/1/1/
[3]W. He, N. Zhang, P. S. Tan, E. W. Lee, T. Y. Li, and T. L. Lim, “A Secure RFID-based Track and Trace Solution in Supply Chains,” In Proceedings of the 6th IEEE International Conference on Industrial Informatics, pp. 1364-1369, 2008.
[4]G. Fenu and P. Garau, “RFID- based Supply Chain Traceability System,” In Proceedings of the 35th Annual Conference of IEEE, pp. 2672-2677, November 2009.
[5]X. Y. Xia and S. H. Han, “A Privacy Protection Protocol for RFID-enabled Supply Chain System,” In Proceedings of the 6th International Conference on Service Systems and Service Management, pp. 305-308, 2009.
[6]蘇志隆,臺灣電子護照建置現況與未來進展,經濟部RFID應用推動辦公室,2008年。
[7]G. M. Ezovski and S. E. Watkins, “The Electronic Passport and the Future of Government-Issued RFID-Based Identification,” In Proceedings of the RFID, 2007. IEEE International Conference, pp. 15-22, 26-28, March 2007.
[8]Venkataramani, Geethapriya; Gopalan, Srividya, “Mobile Phone Based RFID Architecture for Secure Electronic Payments Using RFID Credit Cards,” In Proceedings of the IEEE Second International Conference on Availability, Reliability and Security, pp. 610-620, April 2007.
[9]RFID科技與應用人才培育先導計畫辦公室,http://rfidpo.ntut.edu.tw/rfid/index.jsp
[10]RFID加值應用旗艦示範計畫網站,http://www.u-rfid.com.tw/
[11]A. Juels and R. Pappu, “Squealing Euros: Privacy Protection In RFID–Enabled Banknotes,” In Proceedings of the Financial Cryptography, LNCS 2742, pp. 103–121, 2003.
[12]G. Avoine, “Privacy Issues in RFID Banknote Protection Schemes,” In Proceedings of the 6th International Conference on Smart Card Research and Advanced Applications, Vol. 153, pp. 33-48, 2004.
[13]C. N. Yang, J. R. Chen, C. Y. Chiu, G. C. Wu and C. C. Wu, “Enhancing Privacy and Security in RFID-Enabled Banknotes,” In Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 439-444, August 2009.
[14]韋宜成,RFID 於電子商務安全機制之研究,國立中興大學資訊科學與工程學系碩士學位論文,2008年6月。[15]C. M. Roberts, “Radio frequency identification (RFID)” In Proceedings of the Computers & Security, Vol. 25, Issue. 1, pp. 18-26, February 2006.
[16]余敬虔,無線射頻辨識防偽機制研究,國立台灣科技大學資訊工程系碩士學位論文,2006年1月。[17]許孝萱,行動RFID應用私密性研究,國立暨南國際大學資訊管理研究所碩士論文,2008年6月。[18]林純慈,RFID應用,http://www.tisc.com.tw/new/newreport/industry/upload/industry20061225-2.pdf
[19]RFID快速通關,國人出入境更便捷,經濟部RFID應用推動辦公室,2007年。
[20]A. B. Jeng and L. Y. Chen, “How to enhance the security of e-Passport,” In Proceedings of the Machine Learning and Cybernetics, 2009 International Conference, Vol. 5, pp. 2922-2926, 12-15, July 2009.
[21]M. Meingast, J. King and D. K. Mulligan, “Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport,” In Proceedings of the RFID, 2007. IEEE International Conference, pp. 7-14, 26-28, March 2007.
[22]三軍總醫院,http://www.tsgh.ndmctsgh.edu.tw/
[23]萬芳醫院,http://www.wanfang.gov.tw/
[24]秀傳醫院,http://www.show.org.tw
[25]徐歷新,具定位服務之手持式RFID醫療輔助系統之研究,國立台灣大學資訊工程學系研究所碩士論文,2007年7月。[26]郭文中、吳惠婷、許文祈、蔡竣任,RFID中介軟體與其安全性分析,國立虎尾科技大學資訊工程學系,2006年。
[27]張維平,RFID與科技犯罪,經濟部RFID應用推動辦公室,2009年。
[28]葉慈章、劉耀元、吳建宏,RFID的安全與隱私保護,明新學報第34卷第2期,2008年。[29]A. Juels, D. Molnar, D. Wagner, “Security and Privacy Issues in E-passports,” In Proceedings of the Security and Privacy for Emerging Areas in Communications Networks, pp. 74-88, 5-9, September 2005.
[30]國際民航組織(ICAO),http://www.icao.int/
[31]楊淯婷,應用「RFID(無線射頻辨識)」技術於所有權狀防偽之初探,2005年8月。
[32]鄭博仁、陳林福、陳品儀、謝德鑫,無線射頻辨識技術與資訊安全應用,資訊安全技術通訊,Vol. 10, no. 2, pp. 78-86, 2004.[33]藥品防偽,http://www.fda.gov/Drugs/ResourcesForYou/Consumers/BuyingUsingMedicineSafely/CounterfeitMedicine/default.htm
[34]紀延熹,另一種毒品-偽藥,刑事雙月刊,pp. 52-54, March-April 2006.
[35]美國藥物食品衛生局(FDA),http://www.fda.gov/default.htm
[36]2008年北京奧運會RFID讓票務防偽更有效率,經濟部RFID應用推動辦公室,2008年。
[37]密碼學原理與技術,http://140.127.31.90/ISMS/Lecture/資安技術/密碼學原理與技術.pdf
[38]密碼系統簡介,http://dsns.csie.nctu.edu.tw/course/netsec/2004fall/handout/Chap03.pdf
[39]謝冠宇,具加密與認證機制之主動式RFID 系統,國立臺北科技大學電腦與通訊研究所碩士學位論文,2007年6月。[40]中央銀行,新台幣防偽介紹,http://www.currency.cbc.gov.tw/
[41]張克章、奚正德,RFID應用相關安全機制簡介(下),經濟部RFID應用推動辦公室,2006年。
[42]鄭博仁,RFID無線射頻識別在金融防偽之應用,財金資訊雙月刊,第44期,2006年。
[43]F. Sterzer, “Electronic license plate for motor vehicles,” RCA Corporation, 1977.
[44]高雄市柴油車裝置後處理器-射頻技術(RFID)介紹,http://www.khepa.tw/bus/index_f02.htm
[45]電子車牌試辦,高雄市政府 環境保護局,http://www.ksepb.gov.tw/dispatch/contents.aspx?id=20070805175654481902
[46]K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” In Proceedings of the Computational Intelligence and Security, Vol. 2, pp. 1090-1095, 3-6, November 2006.
[47]趙永宏,增強RFID所有權轉移的安全方法,逢甲大學資訊電機工程碩士在職專班碩士論文,2009年1月。[48]H. B. Chen, W. B. Lee, Y. H. Zhao and Y. L. Chen, “Enhancement of the RFID security method with ownership transfer,” In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pp. 251-254, Jaunary 2009.
[49]楊晴雯、林詠章、曹世昌,具所有權轉換之RFID動態身份RFID使用者隱私保護機制,全國計算機會議,2007年。
[50]EPC global’s website,http://www.epcglobalinc.org
[51]IBM,http://www.ibm.com/