|
王美慈,陳敬壬(2014),探討Chen et al.的RFID認證協定-以後端無線環境的觀點,TBI2014臺灣商管與資訊研討會(pp. 44-54)。
林祝興,黃志雄(2011),資訊安全實務-數位憑證技術與應用(pp. 35-40),臺北:全華圖書股份有限公司。
陳宏宇(2004),RFID系統入門-無線射頻辨識系統,台北:松崗。
陳瑞順(2008),RFID概論與應用(修訂版),台北:全華圖書股份有限公司。
陳昱仁,廖耕億,許建隆,林仲志(2009),RFID概論,台北:華泰文化事業股份有限公司。
鄭同伯(2004),RFID EPC無線射頻辨識完全剖析,台北:博碩文化。
鄭群星(2011),RFID原理(基礎篇),台北:全華圖書股份有限公司。
Cao, T., Shen, P., & Bertino, E. (2008). Cryptanalysis of some RFID authentication protocols. Journal of Communications, 3(7), 25-27.
Chen, Y., Chou, J. S., & Shin, S. J. (2008). A novel mutual authenti-cation scheme based on quadratic for RFID system. Computer Networks, 52, 2373-2380.
Doss, R., Sundaresan, S., & Zhou, W. (2013). A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11, 383-396.
Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556-566.
Stallings, W. (2013). Network Security Essentials Applications and Standards (5th ed.). New Jersey: Prentice Hall.
Yeh, T. C., Wu, C. H., & Tseng, Y. M. (2010, April). Improvement of the RFID authentication scheme based on quadratic residues. Computer Communication, 34, 337-341.
|