[1]H.K.C. Chang, L.C. Yen, “A Study on the Security of RFID with Enhancing Privacy Protection”, The 7th European Conference on Information Warfare and Security (ECIW 2008), 2008.
[2]H.Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity”, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, 2007.
[3]T. Dimitriou, “ A Lightweight RFID Protocol to protect against Traceability and Cloning attacks”, Security and Privacy for Emerging Areas in Communications Networks Conf. , pp. 59-66, 2005.
[4]D.N. Duc, J. Park, H. Lee, K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning”, The Symposium on Cryptography and Information Security(SCIS) Conf. , 2006.
[5]D. Henrici, J. Gotze, P. Muller, “A Hash-based Pseudonymization Infrastructure for RFID Systems“, Security Privacy and Trust in Pervasive and Ubiquitous Computing Conf., pp. 22-27, 2006.
[6]A. Juels, “Minimalist cryptography for low-cost RFID tags”, The Fourth International Conference on Security in Communication Networks, pp. 149-164, 2004.
[7]A. Juels, “RFID Security and Privacy: A Research Survey”, IEEE Journal On Selected Areas in Communications, vol. 24, issue. 4, pp. 381-394, 2006.
[8]A. Juels, R.L. Rivest, M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, 8th ACM Conference on Computer and Communications Security, pp. 103-111, 2003.
[9]S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, M. Ohkubo, “Low-cost RFID Privacy Protection Scheme”, Journal on Transactions of Information Processing Society of Japan , vol. 45, no. 8, pp. 2007-2021, 2004.
[10]H. Lei, T. Cao, “RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks”, The First International Symposium on Data, Privacy, and E-Commerce, pp. 508-510, 2007.
[11]T. Li, G. Wang, “Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols”, 22nd IFIP TC-11 Int’l Information Security Conf. , pp. 109-120, 2007.
[12]Y. Li, X. Ding, “Protecting RFID Communications in Supply Chains”, Computer and Communications Security Proceedings of the 2nd ACM symposium, pp. 234-241, 2007.
[13]J. Lim, H. Oh, S. Kim, “A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection”, The 4th Information Security Practice and Experience Conference , pp. 278-289, 2008.
[14]K. Osaka, T. Takagi, K. Yamazaki, O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, Computational Intelligence and Security Conf. , pp. 1090-1095, 2006.
[15]P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags”, Second Workshop RFID Security, 2006.
[16]B. Song, C. J. Mitchell, “RFID Authentication Protocol for Low-cost Tags”, Wireless Network Security Conf., pp. 140-147, 2008.
[17]S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, First International Conference on Security in Pervasive Computing, pp. 201-212, 2003.
[18]Y. Xiao, X. Shen, B. Sun, L. Cai, “Security and Privacy in RFID and Applications in Telemedicine”, IEEE Communications Magazine, pp. 64-72, 2006.
[19]RFID產業資料庫,http://www.u-rfid.com.tw。
[20]李禮安,「以動態身份為基礎來保護低成本被動式無線射頻辨識標籤的使用者隱私」,國立交通大學資訊工程學系碩士論文,民國95年。[21]陳宏宇,「RFID系統入門-無線射頻辨識系統」,松崗圖書,民國94年。
[22]鄭同伯,「RFID EPC-無線射頻辨識完全剖析」,博碩文化,民國93年。