|
[1]奚正德和張克章, “RFID相關應用與安全機制簡介,” 資通安全專論 T95013. [2]簡宏宇和陳哲豪, “適用於EPC Class 1 Generation 2 RFID 標籤之安全認證機制,” 第十六屆全國資訊安全會議, 2006年6月8-9日, pp. 206-213. [3]RFID發展動態電子半月刊,“全球面對RFID隱私權的發展現況”, http://rfid.more.org.tw/epaper5/ver05_c.html, 2006年4月16日 [4]H. Y. Chien and C. H. Chen (2007), “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards,” Computer Standards & Interfaces, Vol. 29, pp.254-259. [5]H. Y. Chien (2007), “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transcations On Dependable And Secure Computing, Vol. 4, No. 4. [6]D. N. Duc, J. Park, H. Lee and K. Kim (2006), “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” The 2006 Symposium on Cryptography and Information Security. [7]資安人科技網, “美數位身份證引爭議”, http://www.informationsecurity.com.tw/news/view.asp?nid=3020 [8]Enjoy RFID technology, “數位ID在美國引起爭議”, http://enjoyrfid.blogspot.com/2007/03/id.html [9]EPCglobal Inc., http://www.epcglobalinc.org/ [10]Wikipedia, “Pseudorandom number generator”, http://en.wikipedia.org/wiki/Pseudorandom_number_generator [11]C. S. Laih, L. Harn, C. C. Chang, “Contemporary Cryptography and It’s Applications,” 旗標出版. [12]A. Juels, D. Molner, and D. Wagner (2005), “Security and Privacy Issues in E-passport,” Proceedings First Int’l Conference. Security and Privacy for Emerging Areas in Comm. Networks. [13]S. Kinoshita, M. Ohkubo, F. Hoshino, G. Morohashi, O. Shionoiri, and A. Kanai (2005), “Privacy Enhanced Active RFID Tag,” Proceedings Int’l Workshop Exploiting Context Histories in Smart Environments.
[14]S. S. Kumar and C. paar (2006), “Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID,” Proceedings Workshop RFID Security. [15]G. Tsudik (2006), “YA-TRAP: Yet another trivial RFID authentication protocol,” Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, page 640. [16]M. Burmester, T. v. Le, and B. d. Medeiros (2006), “Provably secure ubiquitous systems: Universally composable RFID authentication protocols,” In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, IEEE. [17]C. Chatmon, T. v. Le, and M. Burmester (2006), “Secure anonymous RFID authentication protocols,” Technical Report TR- 060112, Florida State University, Department of Computer Science. [18]G. Avoine and P. Oechslin (2005), “A scalable and provably secure hash based RFID protocol,” In International Workshop on Pervasive Computing and Communication Security, pages 110–114, IEEE, IEEE Computer Society Press. [19]M. Conti and R. D. Pietro and L. V. Mancini (2007), “RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy,” Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. [20]M. Feldhofer, J. Wolkerstorfer, and V. Rijmen (2005), “AES implementation on a grain of sand,” IEE Proceedings Information Security, Vol. 152, No 1, pp.13-20. [21]M. Feldhofer, S. Dominikus, and J. Wolkerstorfer (2004), “Strong authentication for RFID systems using the AES algorithm,” In Conference of Cryptographic Hardware and Embedded Systems, pp. 357–370. [22]A. Juels and S. Weis (2005), “Authenticating pervasive devices with human protocols,” In V. Shoup, editor, Advances in Cryptology – CRYPTO’05, volume 3126 of LNCS, pages 293–308. [23]J. Bringer, H. Chabanne, and D. Emmanuelle (2006), “HB++: a lightweight authentication protocol secure against some attacks,” In IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, IEEE, IEEE Computer Society Press. [24]B. Toiruul and K. Lee (2006), “An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems,” IJCSNS International Journal of Computer Science and Network Security, VOL.6, NO.9B. [25]C. C. Tan, B. Sheng and Q. Li (2007), “Serverless Search and Authentication Protocols for RFID,” Fifth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 3-12. [26]C. C. Tan, B. Sheng and Q. Li (2007), “Secure and Serverless RFID Authentication and Search Protocols,” MANUSCRIPT ID PAPER-TW-DEC-06-1012.R1. [27]P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda (2006), “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags,” Proc. Second Workshop RFID Security. [28]P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda (2006), “EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags,” Proc. OTM Federated Conference. and Workshop: IS Workshop. [29]P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda (2006), “M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags,” Proc. Int’l Conference. Ubiquitous Intelligence and Computing (UIC’06), pp. 912-923. [30]T. Li and G. Wang (2007), “Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols,” Proc. 22nd IFIP TC-11 Int’l Information Security Conference. [31]T. Li and R.H. Deng (2007), “Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol,” Proc. Second Int’l Conference. Availability, Reliability, and Security (AReS ’07). [32]H.-Y. Chien and C.-W. Huang (2007), “Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements,” ACM Operating System Rev., vol. 41, no. 2, pp. 83-86.
|