| 期刊論文1. | Phillips, Ted、Karygiannis, Tom、Kuhn, Rick(2005)。Security Standards for the RFID Market。IEEE Security and Privacy,3(6),85-89。 | 2. | Garfinkel, S. L.、Juels, A.、Pappu, R.(2005)。RFID Privacy: An Overview of Problems and Proposed Solutions。IEEE Security and Privacy Magazine,3(3),34-43。 | 會議論文1. | Inoue, S.、Yasuura, H.(2003)。RFID Privacy Using User-Controllable Uniqueness。RFID Privacy Workshop@MIT。 | 2. | Weis, S. A.、Sarma, S. E.、Rivest, R.、Engels, D. W.。Security and privacy aspects of low-cost radio frequency identification systems。1st Security in Pervasive Computing,201-212。 | 其他1. | Nath, B., Reynolds, F. and Want, R.(200601/200)。RFID Technology and Applications。 | 2. | Ohkubo, M., Suzuki, K. and Kinoshita, S.(200311)。Cryptographic Approach to Privacy-friendly Tags。 | 3. | Rhee, K., Kwak, J. and Kim, S.(2005)。Challenge-response based RFID authentication protocol for distributed database environment。 | 4. | Shih, D. H., Lin, C.Y. and Lin, B(2005)。RFID Tags: Privacy and Security Aspects。 | 5. | Wang, S. and Wang, F.(201005)。Security Analysis of Some RFID Authentication P。 | 6. | Juels,A.(2006)。RFID Security and Privacy: A Research Survey。 | 7. | Kim, I. J., Choi, E. Y., and Lee, D. H.(2007)。Secure Mobile RFID system against privacy and security problems。 | 8. | Juels, A., Szydlo , M., and Rivest, R. L.(200305)。The Block Tag: Selective Blocking of RFID Tags。 | 9. | 200305(2005)。Strengthening EPC Tag against Cloning。 | 10. | Zhang, Y. L. and Guo, H.(201011)。An Improved RFID Privacy Protection Scheme Based on Hash-Chain。 | 11. | Henrici, A. D., and Muller, P.(2004)。Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers。 | 12. | Mohabbat, H.(2010)。Authentication and Lightweight Cryptography in Low Cost RFID。 | 13. | Feldhofer, M., Dominikus, S., and Wolkerstorfer, J.(2004)。Strong Authentication for RFID Systems Using the AES Algorithm。 | |