|
[1] 黃明祥,林詠章。《資訊與網路安全概論:建構雲端運算安全(第四版)》。台北:美商麥格羅.希爾國際股份有限公司台灣分公司出版,2011。 [2] ISO/IEC 14443-3 Identification cards — Contactless integrated circuit(s) cards - Proximity cards — Part 3: Initialization and anticollision (2008). [3] ISO/IEC 14443-4:2008 Identification cards — Contactless integrated circuit(s) cards — Proximity cards — Part 4: Transmission protocol (2007). [4] ISO/IEC 18092:2013 Information technology -- Telecommunications and information exchange between systems -- Near Field Communication -- Interface and Protocol (NFCIP-1)(2013). [5] NFC Analog Specification Technical Specification(1st Edition, 2012). [6] Standards ECMA 385 NFC-SEC:NFCIP-1 Security Services and Protocol (3rd Edition, 2013). [7] Standards ECMA 386 NFC-SEC-01:NFC-SEC Cryptography Standard using ECDH and AES (2rd Edition, 2010). [8] Alzahrani, A., Alqhtani, A., Elmiligi, H., Gebali, F., Yasein, M. S., “NFC security analysis and vulnerabilities in healthcare applications”, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp.302-305, Victoria, BC, Canada, August 27-29, 2013. [9] Charl, A. O., Gerhard, P. H., “A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment”, 2011 Third International Workshop on Near Field Communication, pp. 44-49, Hagenberg, Austria, February 22, 2011. [10] Elbagoury, A., Mohsen, A., Ramadan, M., Youssef, M., “Practical provably secure key sharing for near field communication devices”, 2013 International Conference on Computing, Networking and Communications (ICNC), pp.750-755, San Diego, USA, January 28-31, 2013. [11] Hasoo, E., Hoonjung, L., Heekuck, O., “Conditional Privacy Preserving Security Protocol for NFC Applications”, 2013 IEEE International Conference on Consumer Electronics (ICCE), pp.153-160, Las Vegas, NV, USA, January 11-14, 2013. [12] Jara, A. J., Zamora, M. A., Skarmeta, A. F. G., “Secure use of NFC in medical environments”, 2009 5th European Workshop on RFID Systems and Technologies (RFID SysTech), pp.1-8, Blockhaus, Germany, June 16-17, 2009. [13] Koblitz, N., “Elliptic Curve Cryptosystems”, Mathematics of Computation, Volume 48,Issue 177, pp. 203-209, January 1987. [14] Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.,” NFC Devices: Security and Privacy”, 2008. ARES 08. Third International Conference on Availability, Reliability and Security, pp.642-647, Barcelona, Spain,March 4-7, 2008. [15] Menezes, A.J.,Vanstone, S.A., “Elliptic Curve Cryptosystems and Their Implementation”, Journal of Cryptology,Volume 6, Issue4, pp.209-224, September 1993. [16] Roland, M., Langer, J., Scharinger, J., ”Practical Attack Scenarios on Secure Element-enabled Mobile Devices”, 2012 4th International Workshop on Near Field Communication (NFC), pp.19-24, Helsinki, Finland, March 13, 2012. [17] Standardized NFC Security Protocols-Mobile Payment and NFC Tutorial http://mp-nfc.org/nfc_security_standardized_nfc_security_protocols.html(Reference Date: February 2, 2014). [18] NFC Forum Issues Specifications For Four Tag Types NFC Forum http://nfc-forum.org/newsroom/nfc-forum-issues-specifications-for-four-tag-types/ (Reference Date: June 24, 2014). [19] NFC Forum Technical Specifications http://members.nfc-forum.org/specs/spec_list/ (Reference Date: June 24, 2014). [20] NFC Analog Specification Technical - Technical Specificationhttp://members.nfc-forum.org/specs/spec_list/ (Reference Date: June24, 2014)
|