|
[1] 經濟部智慧財產局, “EUIPO-OECD發布最新仿冒與盜版品貿易趨勢報告,” 23 4 108. [線上]. Available: https://www.tipo.gov.tw/ct.asp?xItem=703908&ctNode=7124&mp=1. [2] R. a. Markets, "Global Brand Counterfeiting Report 2018," 2018. [3] "Certificate of authenticity," [Online]. Available: https://en.wikipedia.org/wiki/Certificate_of_authenticity. [Accessed 5 8 2019]. [4] "License Sticker (COA)," [Online]. Available: https://www.msembedded.biz/en/licensing/license-sticker/. [Accessed 1 7 2019]. [5] "Case Studies," [Online]. Available: https://www.delarue.com/global-insights/case-studies. [Accessed 1 7 2019]. [6] "ISO 14298," [Online]. Available: https://www.securityprinters.org/index.php/intergraf-certification/iso-14298-and-cwa-15374. [Accessed 1 7 2019]. [7] . A. Espejel-Trujillo, . I. Castillo-Camacho, M. Nakano-Miyatake and H. Perez-Meana, "Identity document authentication based on VSS and QR codes," Procedia Technology, vol. 3, pp. 241-250, 2012. [8] "How to Tell - Software - Microsoft," [Online]. Available: https://www.microsoft.com/en-us/howtotell/Software.aspx. [9] "How to Tell – Hardware," [Online]. Available: https://www.microsoft.com/en-gb/howtotell/Hardware.aspx. [10] “英特爾中國盒裝處理器正版驗證,” [線上]. Available: https://cbaa.intel.com/hint.aspx. [11] "Barcode," [Online]. Available: https://en.wikipedia.org/wiki/Barcode. [12] "Mechanism of barcode scanning," DENSO WAVE, [Online]. Available: https://www.denso-wave.com/en/adcd/fundamental/barcode/scan/index.html. [13] "code 39," [Online]. Available: https://en.wikipedia.org/wiki/Code_39. [Accessed 1 7 2019]. [14] “QR開発、きっかけはバーコードの限界 生みの親が語る,” [線上]. Available: https://www.asahi.com/articles/ASL2H6RTGL2HUZVL004.html. [存取日期: 5 8 2019]. [15] "ISO IEC 18004 2015 Standard," [Online]. Available: https://www.iso.org/standard/62021.html. [16] H. K. C. C. S. L. R. R. &. M. N. J. Chu, "Halftone QR Codes.".ACM Transactions on Graphics (TOG), 32(6), 217.. [17] "FIDO2," [Online]. Available: https://fidoalliance.org/specifications/. [18] M. Naor and A. Shamir, "Visual cryptography," in Workshop on the Theory and Application of of Cryptographic Techniques, Perugia, 1994. [19] O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics letters, vol. 12, no. 6, pp. 377-379, 1987. [20] G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, no. 1-2, pp. 143-161, 2001. [21] "DS28C36," [Online]. Available: https://www.maximintegrated.com/cn/products/embedded-security/secure-authenticators/DS28C36.html. [Accessed 1 7 2019]. [22] "DENSO WAVE QR Code," [Online]. Available: https://www.qrcode.com/zh/. [Accessed 5 8 2019]. [23] "Fail-safe," [Online]. Available: https://en.wikipedia.org/wiki/Fail-safe. [24] "A Simple Solution Simplifies Authentication to Ensure Device Security," [Online]. Available: https://www.digikey.com/en/articles/techzone/2018/jun/a-simple-solution-simplifies-authentication-to-ensure-device-security. [Accessed 1 7 2019]. [25] "Implementing Secure Authentication Without Being a Cryptography Expert," [Online]. Available: https://www.maximintegrated.com/cn/app-notes/index.mvp/id/6391. [Accessed 1 7 2019].
|