|
[1]Curran, Kevin, et al., “An evaluation of indoor location determination technologies.,” Journal of Location Based Services, vol. 5,no. 2, pp. 61-78, 2011. [2]Sebastian Anthony, Think GPS is cool? IPS will blow your mind, (http://www.extremetech.com/extreme/126843-think-gps-is-cool-ips-will-blow-your-mind), 2012 [3]改善定位精確度- Google 地圖行動版說明, (https://support.google.com/maps/answer/2839911?hl=zh-Hant&ref_topic=3137371&co=GENIE.Platform%3DAndroid&oco=1) [4]Wikipedia, Google Play, (https://en.wikipedia.org/wiki/Google_Play) [5]WiGLE: Wireless Network Mapping (https://wigle.net/) [6]William Stallings(2005). Cryptography and Network Security Principles and Practices, Fourth Edition. United States: Prentice Hall. [7]William Stallings, Cryptography and Network Security Principles and Practices, United States: Prentice Hall, 2005. [8]Shaolin, Wi-Fi positioning system 欺騙 (1), (http://tech.shaolin.tw/posts/2013/07/13/wi-fi-pos itioning-system-spoofing-1), 2013 [9]Shaolin, Wi-Fi positioning system 欺騙 (2), (http://tech.shaolin.tw/posts/2013/08/05/wi-fi-pos itioning-system-spoofing-2), 2013 [10]Halevi, Shai, and Hugo Krawczyk., “Public-key cryptography and password protocols.,” Journal of ACM Transactions on Information and System Security (TISSEC), vol. 2, no. 3, pp. 230-268., 1999. [11]DD-WRT (https://en.wikipedia.org/wiki/DD-WRT) [12]ADMIN, What is firmware?, (http://incepator.pinzaru.ro/software/what-is-firmware/), 2013. [13]Wikipedia, Wi-Fi positioning system, (https://en.wikipedia.org/wiki/Wi-Fi_positioning_ system) [14]Oguejiofor, O. S., et al., “Trilateration based localization algorithm for wireless sensor network..,” International Journal of Science and Modern Engineering (IJISME), vol. 1, no. 10, pp. 21-27., 2013. [15]Han, Guangjie, et al., “Path planning using a mobile anchor node based on trilateration in wireless sensor networks.,” Wireless Communications and Mobile Computing, vol. 13, no. 14, pp. 1324-1336., 2013. [16]Thorsten Vaupel, Jochen Seitz, Frédéric Kiefer, Stephan Haimerl and Jörn Thielecke. “Wi-Fi Positioning: System Considerations and Device Calibration.,” IEEE In Indoor Positioning and Indoor Navigation (IPIN) International Conference, pp. 1-7., 2010. [17]He, Suining, and S-H. Gary Chan. “Wi-Fi fingerprint-based indoor positioning: Recent advances and comparisons.,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 466-490., 2016. [18]Han, Dongsoo, Byeongcheol Moon, and Giwan Yoon. “Address-based crowdsourcing radio map construction for Wi-Fi positioning systems.,” IEEE Indoor Positioning and Indoor Navigation (IPIN) International Conference, pp. 58-67., 2014. [19]Warner, Jon S., and Roger G. Johnston. “GPS spoofing countermeasures.,” Homeland Security Journal, vol. 25, no. 2, pp. 19-27., 2003. [20]Google Europe Blog: Data collected by Google cars, (http://googlepolicyeurope.blogspot.tw/2010/04/data-collected-by-google-cars.html), 2010. [21]Google Maps Geolocation API, (https://developers.google.com/maps/documentation/geolocation/intro#wifi_access_point_object) [22]Wikipedia, JSON, (https://en.wikipedia.org/wiki/JSON) [23]cURL (https://curl.haxx.se) [24]RADIOUS(https://zh.wikipedia.org/wiki/RADIUS) [25]DD-WRT.com (http://www.dd-wrt.com/site/support/router-data base) [26]Steve Heath, Embedded Systems Design, [27]Kaur, Navjot, and Himanshu Aggarwal. “Web log Analysis for Identifying the number of visitors and their Behavior to Enhance the Accessibility and Usability of Website.,” International Journal of Computer Applications, vol. 110, no. 4, 2015. [28]Kuhn, D. Richard, et al. “Introduction to public key technology and the federal PKI infrastructure.,” National Inst of Standards and Technology Gaithersburg MD, 2001. [29]水中落葉, Google Maps定位的原理, (http://fallenleaf.csie.org/blog/2011/07/02/260), 2011 [30]郭文中,朱育萱. “無需驗證表的多伺服器認證協定之安全性分析與改良.,” 全國資訊安全會議. 中華民國資訊安全學會, pp. 151-156., 2010.
|