[1]李岳縉,“應用RFID於醫療院所之分析與系統規劃”,國立中正大學醫療資訊管理研究所碩士學位論文,2005。[2]林彥君、鄭博仁、余敬虔,“無線射頻辨識防偽機制研究”,國立台灣科技大學資訊工程系碩士學位論文,台北,2006。[3]陳育毅、曾燕芬,“RFID系統不同權限讀取器的安全存取控制協定”,興大工程學刊,Vol.19,No.1,pp.9-18,March,2008。[4]陳育毅、詹進科、曾燕芬,“適用於群組成員不同權限等級之RFID安全存取控制協定”,中華民國九十六年全國計算機會議論文集(四),pp.535-545,Dec 20-21,2007。
[5]陳育毅、詹進科、曾燕芬,“群組成員存取權限差異化之RFID系統”, 2008 RFID科技論文研討會,Feb 1,2008。
[6]陳育毅、曾燕芬,“群組成員存取權限差異化與所有權可移轉之RFID系統”,第十九屆國際資訊管理學術研討會,May 16-17,2008。
[7]遠傳,“小兵立大功:微感商務”,企業整合通訊,pp.30-31,October,2001。
[8]鄭博仁、陳林福、陳品儀、謝德鑫,“無線射頻辨識技術與資訊安全應用”,資訊安全技術通訊,Vol.10,No.2,pp.78-86,台北,2004。
[9]Accenture , "Outlook Point of View",展望新知快訊,Aug,2001。
[10]John Ayoade, "Security implications in RFID and authentication processing framework", Computers & Security, Vol. 25, No. 3. May 2006, pp. 207–212.
[11]A. Aguilar, W. van der Putten, and F. Kirrane, "Positive patient identification using RFID and wireless networks", In HISI 11th Annual Conference and Scientific Symposium, Dublin, Ireland, November 2006.
[12]J. Bardram, "Hospitals of the future - ubiquitous computing support for medical work in hospitals", The Second International Workshop on Ubiquitous Computing, In Proceedings of UbiHealth 2003.
[13]J. Bardram, "Applications of context-aware computing in hospital work: examples and design principles", Proceedings of the 2004 ACM symposium on Applied computing, 2004, pp. 1574–1579.
[14]Vladimir Boginski, In K. Mun, Yuzhou Wu, Katherine P. Mason and Chuck Zhang, "Simulation and Analysis of Hospital Operations and Resource Utilization Using RFID Data", 2007 IEEE International Conference on RFID Gaylord Texan Resort, Grapevine, TX, USA, March 26-28, 2007.
[15]Hung-Yu Chien, "Secure Access Control Schemes for RFID Systems with Anonymity", IEEE International Conference on 10-12 May 2006, pp. 96–99.
[16]Belal Chowdhury and Rajiv Khosla, "RFID-based Hospital Real-time Patient anagement System", 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007.
[17]J. Ericson, "RFID for Hospital Care", in Line 56, the E-Business Executive Daily. July 23, 2004.
[18]Sepideh Fouladgar , Hossam Afifi, "A Simple Delegation Scheme for RFID Systems (SiDeS) ", RFID, 2007. IEEE International Conference on 2007, pp.1 – 6, Gaylord Texan Resort, Grapevine, TX, USA March 26-28, 2007.
[19]Jill A. Fisher and Torin Monahan, "Tracking the social dimensions of RFID systems in hospitals", international journal of medical informatics 77, 2008, pp.176–183.
[20]Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song, "An approach to security and privacy of RFID system for supply chain", E-Commerce Technology for Dynamic E-Business, 2004. IEEE International Conference on 2004, pp.164 – 168
[21]Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim, "Efficient Authentication for Low-Cost RFID systems", International Conference on Computational Science and its Applications - ICCSA 2005, pp.619-627, 2005.
[22]Dirk Henrici, Paul Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on 14-17 March 2004, pp.149 – 153
[23]Hun-Wook Kim, Shu-Yun Lim, Hoon-Jae Lee, "Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security", IEEE International Conference on Hybrid Information Technology - Vol2 (ICHIT''06) 2006 pp. 718-723
[24]Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi, "Analysis of the RFID Security Protocol for Secure Smart Home Network", Hybrid Information Technology, ICHIT''06. International Conference on Volume 2, Nov. 2006 pp.356 – 363
[25]H. Knospe, H. Pohl, "RFID Security", Information Security Technical Report , Volume 9, No. 4, Dec 2004.
[26]Mikko Lehtonen, Thorsten Staake, Florian Michahelles, and Elgar Fleisch, "From Identification to Authentication–A Review of RFID Product Authentication Techniques", Printed handout of Workshop on RFID Security-RFIDSec, 2006, Springer.
[27]Huiyun Li, Fengqi Yu, and Yun Hu, "A Solution to Privacy Issues in RFID Item-level Applications", Proceedings of the 2007 IEEE, International Conference on Integration Technology, March 20 - 24, 2007, Shenzhen, China.
[28]Huzaifa Al Nahas and Jitender S. Deogun, "Radio Frequency Identification Applications in Smart Hospitals", Twentieth IEEE International Symposium on Computer-Based Medical Systems, 2007.
[29]M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic approach to "privacy-friendly" tags", RFID Privacy Workshop, Cambridge, 2003.
[30]Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda, "LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification", Computer Standards & Interfaces, 2007 – Elsevier.
[31]Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags", Proceedings of 2nd Workshop on RFID Security, 2006.
[32]S. A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Master’s Thesis, Massachusetts Institute of Technology, May, 2003.
[33]S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security in Pervasive Computing, Lecture Notes in Computer Science, Volume 2802, pp. 201–212, Berlin 2004.
[34]Shang-Wei Wang, Wun-Hwa Chen, Chorng-Shyong Ong, Li Liu, Yun-Wen Chuang, "RFID applications in hospitals: a case study on a demonstration RFID project in a Taiwan hospital", Proceedings of the 39th Hawaii International Conference on System Sciences, 2006.
[35]Jianping Wang, Huiyun Li, and Fengqi Yu, "Design of Secure and Low-Cost RFID Tag Baseband", Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on Publication Date: 21-25 Sept. 2007.
[36]Yang Xiao, Xuemin Shen, Bo Sun and Lin Cai, "Security and Privacy in RFID and Applications in Telemedicine", IEEE Communications Magazine, April 2006, pp.64-72.
[37]Lan Zhang, Huaibei Zhou, Ruoshan Kong, Fan Yang, "An improved approach to security and privacy of RFID application system", Wireless Communications, Networking and Mobile Computing, 2005. Proceedings. 2005 International Conference on Volume 2, 23-26 Sept. 2005, pp.1195 – 1198.