[1]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, Computational Intelligence and Security, 2006 International Conference on vol. 2, 3-6 Nov, pp. 1090-1095, 2006.
[2]H. Lei and T. Cao, “RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks”, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), pp. 508-510, Nov. 2007.
[3]E. J. Yoon and K. Y. Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer”, NPC, 2008 IFIP International Conference on Network and Parallel Computing, pp.68 - 73, 2008.
[4]H. B. Chen, W. B. Lee, Y. H. Zhao, and Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer”, Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, January 15-16, 2009.
[5]B. Y. Song and C. J. Mitchell, “Scalable RFID security protocols supporting tag ownership transfer”, Computer Communications, vol. 34, pp.556-566, 2011.
[6]K.H.S. Sabaragamu Koralalage, S. Mohammed Reza, J. Miura, Y. Goto, and J. Cheng, “POP Method: An Approach to Enhance the Security and privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism”, Proceedings of the 2007 ACM symposium on Applied computing(SAC ''07), pp.270-275, 2007.
[7]P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, T. Y. Li, and Y. J. Li, “Vulnerability analysis of RFID protocols for tag ownership transfer”, Computer Networks, vol. 54, pp. 1502-1508, 2010.
[8]G. Kapoor,W. Zhou, and S. Piramuthu, “Multi-tag and multi-owner RFID ownership transfer in supply chains”, Decision Support Systems, vol. 52 Issue: 1, pp.258-270, Dec. 2011.
[9]D. Molnar, A. Soppera and D. Wagner, A Scalable, “Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags”, Workshop in Selected Areas in Cryptography, Aug. 2005.
[10]S. Fouladgar and H. Afifi, “A Simple Delegation Scheme for RFID Systems (SiDeS)”, in Proceedings of IEEE International Conference on RFID, pp. 1–6, Mar. 2007.
[11]S. Fouladgar, H. Afifi, “A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags”, Journal of Communications vol. 2, No. 6, pp.6-13, Nov. 2007.
[12]S. Fouladgar, and H. Afifi, “An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags”, in Proceedings of the first International EURASIP Workshop on RFID Technology, pp. 59–62, Sept. 2007.
[13]M. H. Yang, “Across-authority lightweight ownership transfer protocol”, Electronic Commerce Research and Applications, vol. 10 Issue 4, July 2011.
[14]G. Kapoor and S. Piramuthu, “Single RFID Tag Ownership Transfer Protocols”, IEEE Transactions on Systems, Man, and Cybernetics, Issue 99, pp.1-10, 2011.
[15]M. H. Yang and H. Y. Hu, “Protocol for ownership transfer across authorities with the ability to assign transfer target”, Security and Communication Networks, Vol.0 , No.0, 2011.
[16]N. Jayanth, Sidney, “Compressor Warranty Method”, US Patent, No. 0238388 A1,Oct. 2006.
[17]Flavio D. Garcia, Gerhard Koning Gans, Ruben Muijrers, Peter Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs, “Dismantling MIFARE Classic”, In: Jajodia, S., Lopez, J.(Eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97–114, 2008.
[18]Y. H Lien, C. T. Hsi, X. Leng, J. H. Chiu, H. K. C. Chang,“An RFID Based Multi-batch Supply Chain Systems”, Wireless Pers Commun, pp. 1-21, 2010.
[19]N.W. Lo and K.H. Yeh, “Mutual RFID Authentication Scheme for Resource-constrained Tags”, Journal of Information Science and Engineering, Vol. 26, No. 5, pp. 1875-1889, 2010.
[20]Y. J. Zuo, “Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags”, Hawaii International Conference on System Sciences, pp. 1-10, Jan. 2010.
[21]International Organization for Standardization, “Proximity cards. ISO/IEC 14443”, 2003.
[22]ISO/IEC18092, Information Technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1), International Organization for Standardization Std., 2004.
[23]ECMA-340, Near Field Communication Interface and Protocol (NFCIP- 1), European Computer Manufacturer Association Std., 2004.
[24]ECMA-352, Near Field Communication Interface and Protocol (NFCIP- 2), European Computer Manufacturer Association Std., 2010.
[25]M.Roland, J.Langer. “Digital Signature Records for the NFC Data xchange Format”, in Proceedings of Second International Workshop on Near Field Communication , pp. 71-76, 2010.
[26]NFC Forum, http://www.nfc-forum.org/home/。(查詢時間:2012/06/18)
[27]Near Field Communications World (2011, January). “Stanford researchers develop first Android NFC P2P apps”, http://www.nfcworld.com/2011/01/31/35785/stanford-researchersdevelop-first-android-nfc-p2p-apps/。(查詢時間:2012/06/18)
[28]NXP Semiconductors, http://www.tw.nxp.com/documents/data_sheet/MF1S50YYX.pdf。(查詢時間:2012/06/18)
[29]精實新聞, “Wal-Mart 2010年8月將為衣物加上RFID標籤”, http://www.moneydj.com/kmdj/news/newsviewer.aspx?a=59a94cf0-2dfe-4a92-8694-0d0b44627f0a。(查詢時間:2012/06/18)
[30] 徐春進, 史敦仁, “捷運系統票證加密與通訊安全”, 捷運技術半年刊, No.38, p214-223, 2008.