| 期刊論文1. | Roberts, C. M.(2006)。Radio frequency identification (RFID)。Computers & Security,25(1),18-26。 | 2. | Chien, H. Y.、Chen, C. H.(2007)。Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards。Computer Standards & Interfaces,29(2),254-259。 | 3. | Rieback, M. R.、Crispo, B.、Tanenbaum, A. S.(2006)。The Evolution of RFID Security。IEEE Pervasive Computing,5(1),62-69。 | 4. | Rotter, P.(2008)。A Framework for Assessing RFID System Security and Privacy Risks。IEEE Security & Privacy,7(2),70-77。 | 5. | Weinstein, R.(2005)。RFID: A Technical Overview and Its Application to the Enterprise。IT Professional,7(3),27-33。 | 會議論文1. | Duc, Dang Nguyen、Park, Jaemin、Lee, Hyunrok、Kim, Kwangjo(200601)。Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning。Symposium on Cryptography and Information Security。Hiroshima。 | 圖書1. | 陳昱仁、廖耕億、許建隆、林仲志、鍾乾癸(2009)。RFID概論。臺北:華泰文化。 延伸查詢 | 其他1. | Burmester, M., Medeiros, B., Munilla, J., & Peinado, A.(2009)。Secure EPC Gen2 compliant Radio Frequency Identification。 | 2. | Choi, E.Y., Lee, D.H. & Lim, J.I.(2009)。Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 Systems。 | 3. | Deursen., T., & Radomirovic, S.(2008)。Attacks on RFID Protocols。 | 4. | EPCglobal Inc.(2008)。EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communication at 860 MHz-960 MHz Version 1.2.0。 | 5. | EPCglobal Inc.(2005)。EPCglobal Object Name Service (ONS) Standard Version 1.0.。 | 6. | Kim, K.H., Choi, E.Y., Lee, S.M. & Lee, D.H.(2006)。Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems。 | 7. | Kok, Guido R.(2007)。RFID Jamming。 | 8. | Lo, N. W., & Yeh, K. H.(2010)。A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems。 | 9. | Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., & Ribagorda A.(2006)。LMAP: A Real Lightweight MutualAuthentication Protocol for Low-cost RFID tags。 | 10. | Sun, H.M. & Ting, W.C.(2009)。A Gen2-Based RFID Authentication Protocol for Security and Privacy。 | |