[1]林傑毓、馬正義 RFID應用於國軍戰備之探討,2005國防雜誌第二十卷第八期。[2]江佳益,“應用射頻識別系統於國軍飛機維修流程分析與改善”,立德管理學院科技管理研究所碩士論文,2005 年。
[3]A. Juels, M. Szydlo , and R. L. Rivest,“The Block Tag:Selective Blocking of RFID Tags “, ACM Consumer Privacy, pp. 103 – 111, may 2003.
[4]林智溢,2005,"無線射頻辨識技術隱私與安全之研究",國立雲林科技大學資訊管理系碩士班,碩士論文。
[5]A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of applied cryptography,” CRC Press, 1996.
[6]W. Stallings, Cryptography and network security: principles and practice, 3rd Ed., Prentice Hall Media type, Aug. 2002.
[7]賴溪松、韓亮、張真誠,近代密碼學及其應用,旗標出版股份有限公司,2004年。
[8]W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. onInformation Theory, vol. 22, no. 6, pp. 644-654, 1976.
[9]周碧欣,“第三代行動通訊認證機制之研究”,世新大學管理學院資訊管理系碩士學位論文,2006年。[10]FIPS PUB 180-1, “Secure hash standard (SHS),” NIST, US Department ofCommerce, Washington D. C., Apr. 1995.
[11]C. M. Huang, and J. W. Li, “Authentication and key agreement protocol forUMTS with low bandwidth consumption,” IEEE Proceedings of the 19th IntlConf. on Advanced Information Networking and Applications (AINA'05), vol. 1,pp. 392-397, Mar. 2005.
[12]陳帥名,“免儲存驗證資訊之通行碼身份認證協定”,天主教輔仁大學資訊工程研究所碩士學位論文,2004年。[13]T. Tsuji, and A. Shimizu, “One-time password authentication protocol against theft attacks,” IEICE Trans. on Communication, vol. E87B, no. 3, pp. 523-529,Mar. 2004.
[14]陳嘉宏,“使用ElGamal加密機制的通行碼驗證與金鑰交換協定”,國立交通大學資訊科學研究所碩士學位論文,2002 年。[15]C. L. Lin, H. M. Sun, and T. Hwang, “Attacks and solutions on strong-password authentication,” IEICE Trans. on Communication, vol. E84-B, no. 9, pp.8 1 2622-2627, 2001.
[16]C. L. Hsu, “Security of two remote user authentication schemes using smart cards,” IEEE Trans. on Consumer Electronics, vol. 49, no. 4, pp. 1196-1198,Nov. 2003,
[17]H. T. Yeh, H. M. Sun, and T. Hwang, “Security analysis of the generalized key agreement and password authentication protocol,” IEEE Communications Letters, vol. 5, no. 11, pp. 462-463, 2001.
[18]A. M. B. Eldin, “Key exchange by synchronization of two chaotic systems,”IEEE Joint Conf., ICCES'06, pp. 178-182, Nov. 2006.
[19]B. Yee, “Monotonicity and partial results protection for mobile agents,” Intl Distributed Computing Systems, pp. 582-591, May 2003.
[20]伍台國、馬兆顯、黃麗芳、陳正鎔“無線射頻辨識系統訊息加密傳送之研究”, 2006數位科技與創新管理國際研討會。
[21]A. Juels, M. Szydlo , and R. L. Rivest, “The Block Tag:Selective Blocking of RFID Tags “, ACM Consumer Privacy, pp. 103 – 111, may 2003.
[22]Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, 2003。
[23]A. W. Stcphcn, E. S. Sanjay, L. R. Ronald, and W. E. Daniel, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing, Vol. 2802, pp.201-212, 2004.
[24]Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K.Chan, “Cryptography and authentication on RFID passive tags for apparel products, ” Computer in Industry 57, 2005, pp. 342-349.
[25]Chen, Yalin, Chou, Jue-Sam and Sun, Hung-Min “A novel mutual authentication scheme based on quadratic residues for RFID systems,” Computer Networks, Vol. 52, No. 12, pp. 2373-2380, August 2008.
[26]孫屏台 莊世良 李坤森 吳宗翰 陳正鎔,“隱匿性TAG 與RFID 系統認證之探討”, 2008 RFID 科技論文研討會