|
英文部分 [1] Auto-ID Center, 2005, http://www.autoidcenter.com. [2] Auto-ID Center, 2005, “Technology Guide”, http://www.autoidcenter.com/aboutthetech.asp. [3] Auto-ID Labs, 2005, “EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.0.8”, //www.autoid.org/2005docs/ SG3 200501 435 UHFGen2 v1.0.8.pdf. [4] EPCglobal, 2005, http://www.epcglobalinc.org,. [5] Electronic Product Code Global Inc, 2005, http://www.epcglobalinc.org. [6] Feldhofer, Martin, May 2004, “An Authentication Protocol in a Security Layer for RFID Smart Tags”, The 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004), IEEE Proceedings, PP. 759-762. [7] Finkenzeller, Klaus, October 2002, “RFID-Handbuch”, Hanser Fachbuchverlag, Third Edition. [8] Finkenzeller, Klaus, May 2003, “RFID Handbook: Fundamentals and Applications on Tactless Smart Cards and Identification”, 2nd Edition, John Wiley and Sons Ltd. [9] Henrici, Dirk and Muller, Paul, March 2004, “Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers”. International Workshop on Pervasive Computing and Communication Security (PerSec 2004), PP. 149–153. [10] Henrici, Dirk and Müllerirk, Paul, April 2004, “Tackling Security and Privacy Issues in Radio Frequency Identification Devices”, http://www.icsy.de/~archiv/DPArchiv.0086.pdf. [11] Hellman, Martin, July 1980, “A Cryptanalytic Time-Memory Trade- O”, IEEE Transactions on Information Theory, Vol. IT-26, No. 4 ,PP. 401-406. [12] International Organization for Standardization, March 2003, “ RFID for Item Management–Air Interface, Part 1 – Generic Parameters for Air Interface Communication for Globally Accepted Frequencies”, ISO/IEC 18000-1. [13] International Organization for Standardization, March 2003, “Information Technology AIDC Techniques - RFID for Item Management”, ISO/IEC 18000-3. [14] International Organization for Standardization, 1993, "Information Technology – Security Techniques – Entity authentication mechanisms – Part 3: Entity Authentication Using a Public Key Algorithm”, ISO/IEC 9798-3. [15] Kaiser, Ulrich, 2004 , “Universal Immobilizer Crypto Engine”, The Fourth Conference on the Advanced Encryption Standard (AES), http://www.aes4.org/english/events/aes4/program.html. [16] Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory, 2004, “RFID Security and Privacy”, http://ieeexplore.ieee.org/iel5/ 35/29269/01321406.pdf. [17] RSA Security Lab, 2004, “Thoughts on RFID Security and Privacy”, ITAA RFID Forum, http://www.rsasecurity.com. [18] Sullivan, Laurie, 17 June 2004, “Wal-Mart Outlines RFID Expansion Plans”, InformationWeek. http://www.informationweek.com/story/showArticle.jhtml [19] Web-based bibliography, 2005, “Security and Privacy in RFID systems”, http://lasecwww.epfl.ch/˜gavoine/rfid/.
中文部分 [20] RFiD無線射頻識別技術網站,2005年,http://www.RFiD.org.hk/。 [21] 陳宏宇,2004年10月,「RFID無線射頻辨識系統系統入門」,文魁資訊股份有限公 司。 [22] 普諾瑪集團網站,2005年,「RFID應用系統-安全防範」, Http: //www.promatic.com.cn/chinese/Channels/Products/ Product_RFID_Product_Label.asp。 [23] 鄭同伯,2004年5月,「發展已超過一甲子的RFID正逐漸貼近我們的日常生常」, 通信雜誌,第121期。 [24] 鄭同伯,2004年11月,「RFID EPC無線射頻辨識完全剖析」,博碩文化資訊股份有 限公司。 [25] 國防部陸軍通信電子資訊學校,2005年修訂版,「通資安全基礎課程教材」。 [26] 國防部聯合後勤司令部,2005年,「國軍彈藥作業安全宣教講習教案」。
|