|
[1]ABI Research, http://www.abiresearch.com/home.jsp, 2007. [2]John Ayoade,"Security implications in RFID and authentication processing framework,” Computers & Security, Vol. 25, No. 3, pp. 207-212, May 2006. [3]Chin-Ling Chen and Yong-Yuan Den “A practical RFID system: with mutual authentication and privacy protection," 2007 Taiwan Academic Network Conference (2007 TANET), pp.1-6, October 2007. [4]Yalin Chen, Jue-Sam Chou and Hung-Min Sun,"A novel mutual authentication scheme based on quadratic residues for RFID systems," Computer Networks, Vol. 52, No. 12, pp. 2373-2380, August 2008. [5]Hung-Yu Chien and Che-Hao Chen,"Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards,”Computer Standards and Interfaces, Vol. 29 , Issue 2, pp. 254-259, February 2007. [6]S.H. Choi and C.H. Poon,“An RFID-based anti-counterfeiting system,”IAENG International Journal of Computer Science, Vol. 35, No. 1, pp. 80-91, February 2008. [7]Tassos Dimitriou,“A lightweight RFID protocol to protect against traceability and cloning attacks,”Proc. IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 59-66, Athens, Greece, 2005. [8]Dang Nguyen Duc, Jaemin Park, Hyunrok Lee and Kwangjo Kim, "Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning,”Proc. IEEE Symposium on Cryptography and Information Security Hiroshima (SCIS), Japan, January 2006. [9]Thomas Hjorth,“Supporting privacy in RFID systems,” Master thesis, Technical University of Denmark, Lyngby, Denmark, December 2004. [10]Sozo Inoun and Hiroto Yasuura,“Privacy using user-controllable uniqueness,” Wireless Communications and Networking, Vol. 3, pp. 2041-2046, March 2003. [11]Ari Juels, David Molnar and David Wagner,“Security and privacy issues in e-passports,” Proc. IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks SecureComm, Athens, Greece, pp. 74-88, September 2005. [12]Ari Juels, Ronald L Rivest and Michael Szydlo,“The blocker tag: selective blocking of RFID tags for consumer privacy,”Proc. 10th ACM Conference on Computer and Communications Security, pp. 103-111, 2003. [13]Soo-Young Kang, Deok-Gyu Lee and Im-Yeong Lee,“A study on secure RFID mutual authentication scheme in pervasive computing environment,”Computer Communications, Vol. 31, Issue 18, pp. 4248-4254 December 2008. [14]Soo-Young Kang and Im-Yeong Lee,“A study on new low-cost RFID system with mutual authentication scheme in ubiquitous,”Proc. 2008 International Conference on Multimedia and Ubiquitous Engineering, pp. 527-530, Korea, April 2008. [15]Thomas Kelepouris, Katerina Pramatari and Georgios Doukidis,“RFID enabled traceability in the food supply chain,”Industrial Management and Data Systems, Vol. 107, Issue 2, pp. 183-200, 2007. [16]Divyan M. Konidala and Kwangjo Kim,“Mobile, RFID security issues,”Proc. The 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006. [17]William Knight,“RFID-another technology, another security mess?,”Infosecurity Today, Vol. 3, Issue 3, pp. 35-37, May-June 2006. [18]Learn about RFID, http://www.spartan-solutions.com/learn_about _rfid/index.html, Spartan Solutions. [19]Katina Michael and Luke McCathie,“The pros and cons of RFID in supply chain management,”Proc. International Conference on Mobile Business (ICMB'05), pp. 623-629, July 2005. [20]E. W. T. Ngai, T. C. E. Cheng, S. Au and Kee-hung Lai, "Mobile commerce integrated with RFID technology in a container depot," Decision Support Systems, Vol. 43, Issue 1, pp. 62-76, Feb. 2007. [21]Matthew J.B. Robshaw,“An overview of RFID tags and new cryptographic developments,”Information Security Technical Report, Vol. 11, Issue 2, pp. 82-88, 2006. [22]T. Scott Saponas, Jonathan Lester, Carl Hartung and Tadayoshi Kohno,“Devices that tell on you: the nike+ipod sportkit,”Proc. Technical report, Department of Computer Science and Engineering, University of Washington, 2007. [23]Masahiro Shiomi, Takayuki Kanda, Hiroshi Ishiguro, and Norihiro Hagita,“Interactive Humanoid Robots for a Science Museum,”Intelligent Systems, Vol. 22, Issue. 2, pp.25-32, 2007. [24]Boyeon Song and Chris J. Mitchell, “RFID authentication protocol for low-cost tags,” Proc. First ACM Conference on Wireless Network Security ACM WISec’08, pp. 140-147, Virginia, USA, 2008. [25]Laurie Sullivan,“RFID's the ticket for secure games,” http://www.rfid-world.com/news/209902703?queryText=Olympic+, August, 2008. [26]Masataka Suzukit, Kazukuni Kobarat and Hideki Imait,“Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search,” Proc. IEEE International Conference on Systems, Man, and Cybernetics, Vol. 2, pp. 1250-1255, October 2006. [27]May Tajima,“Strategic value of RFID in supply chain management,”Journal of Purchasing and Supply Management, Vol. 13, Issue 4, pp. 261-273, December 2007. [28]Batbold Toiruul, KyungOh Lee,“An advanced mutual authentication algorithm using AES for RFID systems,” Computer Science and Network Security, Vol. 6, No. 9, pp.156-162, September 2006. [29]Kirk H.M. Wong, Patrick C.L. Hui and Allan C.K. Chan,“Cryptography and authentication on RFID passive tags for apparel products,”Computers in Industry, Vol. 57, Issue 4, pp. 342-349, May 2006. [30]Yang Xiao, Xuemin Shen, Bo Sun and Lin Cai,“Security and privacy in RFID and applications in telemedicine,”IEEE Transactions on Communications Magazine, Vol. 44, Issue 4, pp. 67-72, April 2006. [31]Li-Chih Yen and Henry Ker-Chang Chang,“A Study on the security of RFID with enhancing privacy protection,”The 7th European Conference on Information Warfare and Security (ECIW 2008), pp. 35-40, University of Plymouth, UK, June, 2008. [32]EPCglobalTM Generation 1 tag data standards, Version 1.4, EPCglobal Inc., June 2008,http://www.epcglobalinc.org/standards/tds/tds_1_4-standard-20080611.pdf [33]RFID在醫療產業的應用,http://cdnet.stpi.org.tw/techroom/ market/eerfid/rfid014.htm, STPI, March 2005. [34]RFID在醫療保健產業將有的成長動能, http://cdnet.stpi.org.tw/ techroom/market/eerfid/rfid036.htm, STPI, DEC 2005.
|