[1]K. Ok, V. Coskun, M.N. Aydin and B. Ozdenizci, “Current benefits and future directions of NFC services,” Proceedings of the International Conference on Education and Management Technology, pp.334-338, 2010.
[2]ISO/IEC 14443, “Identification cards - Contactless integrated circuit cards Proximity cards”.
[3]ISO/IEC 18092 (ECMA-340), “Information technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1)”.
[4]J.J. Antonio, M.A. Zamora and A.F.G Skarmeta, “Secure use of NFC in medical environments,” Proceedings of the 5th European Workshop on RFID Systems and Technologies, pp.1-8, 2009.
[5]W.D. Chen, K.E. Mayes, Y.H. Lien and J.H. Chiu, “NFC mobile payment with Citizen Digital Certificate,” Proceedings of the 2nd International Conference on Next Generation Information Technology, pp.120-126, 2011.
[6]S.M. Nasution, E.M. Husni, A.I. Wuryandari, “Prototype of train ticketing application using Near Field Communication (NFC) technology on Android device,” Proceedings of the International Conference on System Engineering and Technology, pp.1-6, 2012.
[7]NFCForum, “Bluetooth Secure Simple Pairing Using NFC - Application Document - NFCForum-AD-BTSSP_1.0,” 2011.
[8]H. Zhang and J. Li,“NFC in medical applications with wireless sensors,” Proceedings of the International Conference on Electrical and Control Engineering, pp.718-721, 2011.
[9]A. Matos, D. Romao and P. Trezentos, “Secure hotspot authentication through a Near Field Communication side-channel,” Proceedings of the IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 807-814, 2012.
[10]H. Eun, H. Lee and H. Oh, “Conditional privacy preserving security protocol for NFC applications,” IEEE Transactions on Consumer Electronics, Vol. 59, No. 1, pp.153 – 160, 2013.
[11]E. Haselsteiner and K. Breitfus, “Security in Near Field Communication (NFC),” Proceedings of the Workshop on RFID Security, 2006.
[12]T.W.C. Brown, T. Diakos and J.A. Briffa, “Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards,” Proceedings of 7th European Conference on Antennas and Propagation, pp.3525-3528, 2013.
[13]NFCForum, “NFC Data Exchange Format (NDEF) - Technical Specification - NFCForum-TS-NDEF_1.0,” 2006.
[14]NFCForum, “Signature Record Type Definition - Technical Specification - NFCForum-TS-Signature_RTD-1.0,” 2010.
[15]M. Roland and J. Langer, “Digital Signature Records for the NFC Data Exchange Format,” Proceedings of the Second International Workshop on Near Field Communication, pp.71-76, 2010.
[16]M.Q. Saeed and C.D. Walter, “Off-line NFC Tag Authentication,” Proceedings of the International Conference for Internet Technology and Secured Transactions, pp.730- 735, 2012.
[17]T. Korak and L.Wilfinger, “Handling the NDEF signature record type in a secure manner,” Proceedings of the IEEE International Conference on RFID-Technologies and Applications, pp.107-112, 2012.
[18]M. Roland, J. Langer and J. Scharinger, “Security Vulnerabilities of the NDEF Signature Record Type,” Proceedings of the 3rd International Workshop on Digital Near Field Communication, pp.65-70, 2011.
[19]M.Q. Saeed and C.D. Walter, “A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition,” Proceedings of the International Conference for Internet Technology and Secured Transactions, pp.283-287, 2011.
[20]G. Koning Gans, J.-H. Hoepman and F. D. Garcia, “A practical attack on the mifare classic,” Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, pp.267-282, 2008.
[21]C.C. Chen, I.T. Chen, C.M. Cheng, M.Y. Chih and J.R. Shih, “A Practical Experience with RFID Security,” Proceedings of the Tenth International Conference on Mobile Data Management: Services and Middleware, 2009. MDM '09, pp.395-396, 2009.
[22]J.J. Antonio, A.F. Alcolea, M.A. Zamora and A.F.G. Skarmeta, “Evaluation of the security capabilities on NFC-powered devices,” Proceedings of the European Workshop on Smart Objects: Systems, Technologies and Applications, pp.1-9, 2010.
[23]M. Hutter and R. Toegl, “A Trusted Platform Module for Near Field Communication,” Proceedings of the Fifth International Conference on Systems and Networks Communications, pp.136-141, 2010
[24]National Institute of Standards and Technology (NIST), “Federal Information Processing Standards Publication 46-3, DATA ENCRYPTION STANDARD (DES),” 1999.
[25]National Institute of Standards and Technology (NIST), “Federal Information Processing Standard Publication 197, the Advanced Encryption Standard (AES)”, 2001.
[26]R. Rivest, A Shamir and L. Aldeman, "A Methoed for Obtaining Digital Signatures and Public-key Cryptosystems," Proceedings of the Communications of the ACM, pp.120-126, 1978.
[27]S. Lee and J.W. Jeon, "Evaluating Performance of Android Platform Using Native C for Embedded Systems," Proceedings of the International Conference on Control Automation and Systems, pp.1160-1163, 2010.
[28]F. Khomh, Y. Hao and Y. Zou, "Adapting Linux for Mobile Platforms: An Empirical Study of Android," Proceedings of the International Conference on Software Maintenance, pp.629-632, 2012.
[29]M.Z. Bjelica, V. Zdravkovic, M. Punt and N. Teslic, "TV-Centric Gaming Applications for Android OS: Architecture and a Framework," Proceedings of the International Conference on Consumer Electronics, pp.667-668, 2013.
[30]NXP Semiconductors, “MIFARE Classic 1K - Mainstream contactless smart card IC, Product data sheet Rev.3.0,” 2011.
中文參考文獻
[31]陳映達,「高級到院前救護制度之評估研究-救護技術員與急診醫護人員出勤模式之成效差異」,國立台灣大學醫療機構管理研究所碩士論文。 2002年。