英文文獻:
1.Auto-ID Center, 2002, “860MHz-930MHz Class1 Radio Frequency Identification Tag Radio Frequency & Logical Communication Interface Specification Candidate Recommendation, Version 1.0.1”, November.
http://www.autoidlabs.org/whitepapers/mit-autoid-tr007.pdf
2.Auto-ID Center, 2003, “13.56 MHz ISM Band Class 1Radio Frequency Identification Tag Interface Specification: Recommended Standard, Version 1.0.0”, Feburary.
http://www.autoidlabs.org/whitepapers/mit-autoid-tr011.pdf
3.Auto-ID Center, 2003, “Auto-ID Reader Protocol 1.0”, Working Draft Version of 5, September.
4.Auto-ID Center, 2003, “Draft Protocol Specification for a Class 0 Radio Frequency Identification Tag”, February.
5.Auto-ID Center, 2003, “PML Core Specification 1.0”, September.
6.Auto-ID Center, 2003, “The Object Name Service Version 0.5 (Beta)”, August.
7.Auto-ID Center, 2003, “The Savant Version 0.1 (Alpha)”, September.
8.Avoine, G., 2004, “Privacy Issues in RFID Banknote Protection Schemes”, The Sixth International Conference on Smart Card Research and Advanced Applications, Toulouse, France, August, pp. 33-48.
9.Avonie, G., Oechslin, P., 2005, “A Scalable and Provably Secure Hash-Based RFID Protocol”, The 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, March.
10.Certicom Research, 2000, “SEC 1: Elliptic Curve Cryptography”, Standards for Efficient Cryptography Group, September.
11.Denning, D.E., 1982, “Cryptography and Data Security”, Addison-Wesley.
12.Diffie, W., Hellman, M.E., 1979, “Privacy and Authentication: An Introduction to Cryptography”, Proceeding of the IEEE, Vol.67, No.3, pp.397-427, March.
13.ElGamal T, 1985, “A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithm”, IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472.
14.EPCglobal, 2004, “EPCTM Tag Data Standards Version 1.1 Rev.1.24”, Standard Specification, April.
15.Feder, B. J., 2005, “Radio Tags Can Find Stray Bags, but Can Airlines Afford Them?”, The New York Times, March 7
http://www.nytimes.com/2005/03/07/technology/07baggage.html?ex=1267938000&en=18c992a6a5195f02&ei=5088&partner=rssnyt
16.Feldhofer, M., 2004, “An Authentication Protocol in a Security Lay for RFID Smart Tags”, IEEE MELECON 2004, Dubrovnik, Coratia, May 12-15.
17.Finkenzeller, K., 2003, “RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition”, Second Edition, John Wiley & Sons, Ltd.
18.INOUE, S., YASUURA, H., 2003, “RFID Privacy Using User-controllable Uniqueness”, RFID Privacy Workshop, MIT, Massachusetts, USA, November.
19.Juels, A., 2004, “Minimalist Cryptography for Low-Cost RFID Tags”, The Fourth International Conference on Security in Communication Networks - SCN 2004, Amalfi, Italia, September.
20.Juels, A., et al.,2003, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, In Proceedings of 10th ACM conference on Computer and Communications Security(CCS 2003), Washington, DC, USA, October, pp. 103-111.
21.Juels, A., Pappu, R., 2003, “Squealing euros: Privacy protection in RFID-enabled banknotes”, In proceedings of Financial Cryptography – FC’03, Le Gosier, Guadeloupe, French West Indies, January, pp. 103-121.
22.Kim, W, Kim, S, et al., 2003, “A platform-based SoC design of a 32-bit smart card”, ETRI Journal, Vol. 25, no. 6, pp. 510-516. December.
23.Koblitz, N., 1987, “Elliptic Curve Cryptosystems”, Mathematics of Compution, vol. 48, pp. 203-309.
24.Kohl, J., Neuman B., 1993, “The Kerberos Network Authentication Service (V5)”, RFC 1510, September.
25.Landt, J., 2001, “Shrouds of Time: The history of RFID”, the Association of Automatic Identification and Data capture Technologies (AIM), October.
26.LARAN RFID, 2004, “A basic introduction to RFID technology and its use in the supply chain”, January.
27.Lenstra, H. W. Jr., 1987, “Factoring integers with elliptic curves”, Annals of Math, vol. 126, pp. 649-673.
28.Miller, V., 1986, “Use of Elliptic Curves in Cryptography”, Lecture Notes in computer science, vol. 218, pp. 417-426.
29.Neuman, B.C., TS’O, T., 1994, “Kerberos: An Authentication Service for Computer Networks”, IEEE Commun. Magazine, vol. 32, pp. 33-38, September.
30.Ohkubo, M., et al., 2004, “Efficient Hash-Chain Based (RFID) Privacy Protection Scheme”, “The Sixth International Conference on Ubiquitous Computing”, Nottingham, England, September.
31.Rivest, R. L., et al., 1978, “A Method for obtaining Digital Signatures and Public-key Cryptosystem”, Communications of the ACM, vol. 21, no. 2, pp. 120--126, February.
32.Sarma, S. E., Weis, S. A., 2002, “RFID Systems, Security & Privacy Implications”, Auto-ID Center, November.
33.Sharma, S., Shevade, U., 2003, “Interoperation of Kerberos and Public Key infrastructure Authentication Frameworks”, The University of Texas At Austin Computer Sciences, Master Thesis.
34.Shih, D.H., et al., 2005, “RFID Tags: Privacy and Security Aspects”, Int. J. Mobile Communications, Vol.3, No.3, pp.214-230.
35.Stallings, W., 2002, “Cryptography and Network Security: Principles and Practices”, Third Edition, New Jersey, Prentice Hall.
36.Steiner, J. G., et al., 1988, “Kerberos: An Authentication Service for Open Network Systems”, In Proceedings of the 1988 USENIX Conference, Dallas, TX, USA, March, pages 191-202.
37.Weis, S. A., 2003, “Security and Privacy in Radio-Frequency Identification Devices”, Massachusetts Institute of Technology (MIT), Master Thesis.
38.Weis, S. A., et al., 2003, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, International Conference on Security in Pervasive Computing - SPC 2003, Boppard, Germany, March, pp. 454-469.
39.Wheeler, D., Needham, R., 1994, “TEA, a Tiny Encryption Algorithm”, In: Proceedings of the 1994 Fast Software Encryption Workshop, Computer Laboratory, Cambridge University, England.
http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html
中文文獻:
40.周利欽,2000,“Kerberos系統密碼認證之改進”,元智大學電機與資訊工程研究所,碩士論文。41.林文儀,2003,“橢圓曲線版的ElGamal數位簽署及其變形”,東海大學,應用數學研究所碩士論文。42.高增英,2005,“無線射頻辨識技術在機場之應用”,中國航空太空學會會刊,53卷,第1期,四月。
http://www.cast.itri.org.tw/aasrc/society_journal/35_1/1-3.htm
43.陳儒恩,2004,”RFID不飛則已 一飛沖天”,網路通訊,151期,頁44-49,資訊與電腦出版社,2月。
44.粘添壽,吳順裕,2004,“資訊與網路安全技術”,旗標出版,台北。
45.黃昌宏,2003,“RFID無線射頻識別標識系統的探討(上)”,印刷新訊,49期,大中華印藝網,九月。
http://www.cgan.com/science/newtech/tech/04052301.htm
46.蔡子宏,2005,“RFID是創意產業的動力之一”,電工資訊,170期,台灣區電機電子工業同業公會,二月。
http://www.teema.org.tw/publish/moreinfo.asp?autono=2351
47.鄭同伯,2004,“RFID EPC無線射頻辨識完全剖析”,博碩文化,台北。
網站資料:
48.FKI Logistex Case Study Series, 2003, “HBS Baggage Hanbdling System Jacksonville International Airport”
http://www.asieurope.com/documents/pdf/JIA_Case_Study.pdf
49.Royal Air Force, History: 1940,
http://www.raf.mod.uk/history/line1940.html
50.Wyld, D. C.,2004,汪曉蘭譯,“航空業利用射頻辨別進行行李追蹤”。
http://www.morerfid.hk/review/2005/hk_rfidWine0503.htmla
51.周世民,2004,“RFID Tag 5大採購須知”,
http://www.eedesign.com.tw/article/document/dc989.htm