|
[1]鄭同伯著, RFID EPC 無線射頻辨識完全剖析, 臺北市:博碩文化, 初版, Nov 2004. [2] 溫榮弘譯, 無線通訊技術與RFID, 臺北市:全華科技圖書股份有限公司, 初版 Aug 2004. [3]巫坤品, 王青青, “密碼學與網路安全-原理與實務”, 臺北市,臺灣培生教育出版社,2004. [4]K. Finkenzeller, “RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification”, 2nd Ed.期刊論文 [6]S. A. Weis, E. S. Sarma, R. L. Rivest, and D.W. Engels, “Security and Privacy Aspects of Low-Cost RadioFrequency Identification Systems”, Security in PervasiveComputing, 2003. [7]M. Feldhofer, “An authentication protocol in a security layer for RFID smart tags”, Proceedings of IEEE MELECON, Vo. 2, P. 759 – 762, 2004 [8]S. Sarma, and D. W. Engels, “RFID Systems, Security & Privacy Implications”, Auto-ID center white paper, Feb 2003. http://www.autoidlabs.org. [9]Gwo-Ching Chang,” A Feasible Security Mechanism for Low Cost RFID Tags” , Mobile Business, 2005. ICMB 2005. International Conference on11-13 July 2005 Page(s):675 – 677. [10]Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song, “An Approach to security and privacy of RFID system for supply chain ”, IEEE International Conference on E-Commerce Technology for Dynamic E-Business, 2004 Page(s):164-168. [11]Auto-ID Center, “860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency & Logical communication Interface Specification Proposed Recommendation Version 1.0.0” , Technical Report MIT-AUTOID-TR-007, Nov. 2002 [12]Sozo Inoue, Hiroto Yasuura, “ RFID privacy using usercontrollable uniqueness” , RFID Privacy Workshop @ MIT,2003 [13]Damith C. Ranasinghe, Daniel W. Engels, Peter H. Cole, “Security and Privacy: Modest Proposals for Low- Cost RFID Systems” [14]Ari. Juels, “Privacy and Authentication in Low-Cost RFID Tags”, submission 2003. [15]Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, “Forward-secure RFID Privacy Protection using Hash Chain”, submitted 2003.
|