[1]林宗志,具時間限制之RFID認證協定,南台科技大學資訊管理研究所碩士論,2007。[2]RFID應用推動辦公室,http://www.rfid.org.tw/。
[3]A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, Vol. 24, pp.381-394, 2006.
[4]A. Juels, "Strengthening EPC tags against cloning", Proceedings of the 4th ACM workshop on Wireless security, pp.67-76, 2005.
[5]D. Molnar and D. Wagner, "Privacy and Security in Library RFID Issues, Practices, and Architectures", Proceedings of 11th ACM Conference on Computer and Community security, pp.210-219, 2004.
[6]D. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers", Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp.149-153, 2004.
[7]D. Ranasinghe, D. Engels, and P. Cole, "Low-Cost RFID Systems: Confronting Security and Privacy", Auto-ID Labs Research Workshop, 2004.
[8]D. Engels, and S. Sarma, "Standardization Requirements with the RFID Class Structure Framework", MIT Auto-ID Lab Technical Report, 2005.
[9]D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags", Selected Areas in Cryptography, pp.276-290, 2005.
[10]EPCglobal, http://www.epcglobalinc.org/home。
[11]H. Knospe and H. Pohl, "RFID Security", Information Security Technical Report, Vol. 9, pp.39-50, 2004.
[12]J. Saito, J.C Ryou, K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", Embedded and Ubiquitous Computing, pp.879-890, 2004.
[13]K. Finkenzeller, "RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification ", 2nd Edition, 2003.
[14]K. Wong, P. Hui and A. Chan, "Cryptography and authentication on RFID passive tags for apparel products, Computers in Industry", pp.342-349, 2005.
[15]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", Computational Intelligence and Security, pp.1090-1095, 2006.
[16]M. Ohkubo, K. Suzuki and S. Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags", MIT RFID Privacy Workshop, 2003.
[17]M. Ohkubo, K. Suzuki and S, Kinoshita, "RFID Privacy Issues and Technical Challenges", Communications of the ACM , Vol. 48, No. 9, pp.66-71, 2005.
[18]M. Conti, R. D. Pietro, L. V. Mancini, and A. Spognardi, "RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy", International Workshop on Pervasive Computing and Communication Security, pp.229-234, 2007.
[19]M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, "AES Implementationon a grain of sand, Information Security", IEE proceedings, Vol. 152, pp.13-20, 2005.
[20]M. Meingast, J. King and D. K. Mulligan, "Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport", IEEE International Conference on RFID, pp.7-14, 2007.
[21]N. M. Haller, "The S/KEY one-time password system", Proceedings of the Symposium on Network and Distributed System Security, pp. 151-157, 1994.
[22]P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing", Emerging Directions in Embedded and Ubiquitous Computing, pp.7-14, 2006.
[23]S. L. Garfinkel, A. Juels, R. Pappu, "RFID privacy: an overview of problems and proposed solutions", IEEE Security and Privacy, pp.34-43, 2005.
[24]S. A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", The Department of Electrical Engineering and Computer Science of MIT, pp.18, 2003.
[25]S. Inoue and H. Yasuura, "RFID Privacy Using User-controllable Uniqueness", MIT RFID Privacy Workshop, 2003.
[26]S. Fouladgar and H. Afifi , "A Simple Delegation Scheme for RFID Systems (SiDES)", IEEE International Conference on RFID, pp.1-6, 2007.
[27]S. Fouladgar and H. Afifi, "An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags", EURASIP International Workshop on RFID Technology, 2007.
[28]S. Lee, T. Asano and K. Kim, "RFID Mutual Authentication Scheme based on Synchronized Secret Information", Symposium on Cryptography and Information Security, pp.17-20, 2006.
[29]T. Phillips, T. Karygiannis, R. kuhn, "Security Standards for the RFID Market", IEEE Security and Privacy", pp.85-89, 2005.
[30]T. Hassan, and S. Chatterjee, "A Taxonomy for RFID", Proceedings of the 39th Annual Hawaii International Conference, pp.184b-184b, 2006.
[31]Uidcenter , http://www.uidcenter.org/index-en.html。
[32]X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, and S. Song, "An Approach to Security and Privacy of RFID System for Supply Chain", Conference on E-Commerce Technology for Dynamic E-Business, pp.164-168, 2005.
[33]Y. Seo, H. Lee and K. Kim , "A Scalable and Untraceable Authentication Protocol for RFID", International Workshop on Security in Ubiquitous Computing Systems, pp.252-261, 2006.