|
參考文獻 [1]H. B. Chen, W. B. Lee, Y. H. Zhao and Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer,” In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, pp. 251–254, 2009. [2]EPCglobal Inc, Retrieved Jan. 11, 2011, from the World Wide Web: http://www.epcglobalinc.org/home [3]S. Fouladgar and H. Afifi, “A simple delegation scheme for RFID systems (SiDeS),” In Proceedings of the IEEE International Conference on RFID, Grapevine, TX, USA, pp. 1–6, 2007. [4]S. Fouladgar and H. Afifi, “An efficient delegation and transfer of ownership protocol for RFID tags,” In Proceedings of the First International EURASIP Workshop on RFID Technology, Vienna, Austria, pp. 59–62, 2007. [5]S. Fouladgar and H. Afifi, “A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags,” Published in Journal of Communications, Vol. 2, pp. 6–13, 2007. [6]Li Gong, Roger Needham and Raphael Yahalom, “Reasoning about Belief in Cryptographic Protocols,” In Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248, 1990. [7]M. Hell, T. Johansson and WilliMeier, “Grain - a stream cipher for constrained environments,” Published in International Journal of Wireless and Mobile Computing, Vol. 2, No. 1, pp. 86–93, 2007. [8]A. Juels, “RFID security and privacy: a research survey,” Published in IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381–394, 2006. [9]G. Kapoor and S. Piramuthu, “Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols,” Published in IEEE Journal of Communications Letters, Vol. 14, No. 3, pp. 260–262, 2010. [10]K. H. S. S. Koralalage, M. R. Selim, J. Miura, Y. Goto and J. Cheng, “POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism,” In Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea, pp. 270–275, 2007. [11]N.Y. Lee and 李育賢, “Off-line authentication protocol for RFID tags,” In Proceedings of 2008第三屆數位教學暨資訊實務研討會EITS2008, 2008, pp. 34. [12]D. Molnar, A. Soppera and D. Wagner, “A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags,” In Proceedings of Selected Areas in Cryptography, Vol. 3897, pp. 276–290, 2005. [13]K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” In Proceedings of 2006 International Conference on Computational Intelligence and Security, Vol. 2, pp. 1090–1095, 2006. [14]A. Poschmann, G. Leander, K. Schramm and C. Paar, “New Light-Weight Crypto Algorithms for RFID,” In Proceedings of 2007. IEEE International Symposium on Circuits and Systems (2007. ISCAS) , pp. 1843-–1846, 2007. [15]M. H. Yang and J.-N. Luo, “Authentication Protocol in Mobile RFID Network,” In Proceedings of the 2009 Fourth International Conference on Systems (ICONS’09) , pp.108–113, 2009. [16]M. H. Yang, “Controlled Delegation Protocol in Mobile RFID Networks,” Published in Eurasip Journal on Wireless Communications and Networking, Vol. 2010, Article ID 170150, 2010. [17]M. H. Yang and H. Y. Hu, “Protocol for ownership transfer across authorities: with the ability to assign transfer target,” Published online in Wiley Online Library (wileyonlinelibrary.com). doi: 10.1002/sec.300, Security and Communication Networks, 2011, [18]Ming Hour Yang, “Across-authority lightweight ownership transfer protocol,” Published in Electronic Commerce Research and Applications, Vol. 10, No. 4, pp. 375–383, 2011. [19]Eun-Jun Yoon, Kee-Young Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer,” In Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, pp. 68-73, 2008. [20]羅嘉寧、楊明豪、許博宇, “行動式無線射頻技術委任授權協定之分析及改良,” In Proceedings of Cryptology and Information Security Conference 2011, Yunlin, Taiwan, 2011.
|