|
[1] 鄭同伯, “RFID EPC 無線射頻辨識完全剖析,” 書號. NE20219. 2004年出版 [2] 顏憶茹、張淳智, “物流管理 原理、方法與實例,” (Logistics Management Theory, Methods and Cases) 前程文化出版 [3] “線上DVD出租-經營典範Netflix之發展背景及服務模式,” 資策會MIC, 2007.4 [4] “線上DVD出租-經營典範Netflix之成功關鍵因素及未來面臨之挑戰,” 資策會MIC, 2007.5. http://trade.1111.com.tw/pg804.asp?eid=fjtmcgyHQvlO [5] Intelligent Times (2006), “未來商店(書摘) ,” http://140.92.88.29/magazine/article_single_207.htm [6] 費伊 (2007), “美國應用RFID技術管理CD/DVD自助租賃,” 《RFID世界網》http://www.1000security.com/html/2007-04/26903.html [7] 經濟部RFID應用推動辦公室(2007), “RFID讓店家善用DVD架面陳列,” http://www.rfid.org.tw/content.php?sn=155 [8] 賽迪網(2007), “RFID技術新用途:防止DVD光碟被盜,” http://news.ccidnet.com/art/1032/20070513/1079653_1.html [9] Alfred J. Menezes, Paul C. van Oorshot, and Scott A. Vanstone. Handbook of Applied Cryptography, chapter 1.9. CRC Press, 1996. [10] Jim Taylor, DVD Demystified, McGraw-Hill Professional, 2nd Edition, New York, 2001. [11] D. Molnar and D. Wagner, “Privacy and Security in Library RFID: Issues, Practices, and Architectures,” in Proceedings of ACM CCS, 2004. [12] T. Dimitriou, “A Lightweight RFID Protocol to protect against Traceability and Cloning attacks,” Proceedings of the IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks – SECURECOMM, 2005. [13] D. N. Duc, J. Park, H. Lee and K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” The 2006 Symposium on Cryptography and Information Security, 2006 [14] Sepideh Fouladgar and Hossam Afifi, “A Simple Delegation Scheme for RFID Systems (SiDeS),” IEEE International Conference on, 26-28 March 2007. [15] S. L. Garfinkel, A. Juels, R. Pappu, “RFID privacy : an overview of problems and proposed solutions,” IEEE Security & Privacy, Vol. 3, No. 3, pp. 34-43, 2005. [16] A. Juels, R. L. Rivest, M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” Proceedings of the 10th ACM conference on Computer and communications security, pp. 103-111, 2003. [17] H. Knospe and H. Pohl, “RFID Security,” Information Security Technical Report, Vol.9, No.4, pp.39-50, Dec. 2004. [18] D. Molnar, A. Soppera, and D. Wagner, “A Scalable, Delegatable Pseudonym Protocol Enabling Owner-ship Transfer of RFID Tags,” in Proceedings of SAC, 2005. [19] Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” First International Conference on Security in Pervasive Computing, 2003. [20] T. Dimitriou, “A Secure and Efficient RFID Protocol that Could make Big Brother (partially) Obsolete,” in Proceedings of IEEE PerCom, 2006. [21] L. Lu, J. Han, L. Hu, Y. Liu, L. M. Ni, “Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems,” in Proceedings of IEEE PerCom, 2007. [22] C. Turcu, R. Prodan, M. Cerlinca, T. Cerlinca, C. Turcu, “Information Storage on RFID Tags: Some Structural Optimizing Solutions,” RFID Eurasia, 2007 1st Annual. [23] W. Wang, Y. Li, L. Hu, L. Lu, “Storage-Awareness: RFID Private Authentication based on Sparse Tree,” in Proceedings of IEEE PerCom, 2007. [24] Jeffrey A. Bloom, etc., “Copy Protection for DVD Video,” Consumer Proceedings of IEEE, vol. 87, no. 7, pp. 1267-1276, July 1999. [25] Xien-Chen Xie, “The Study and Application of Computer Software Protection,” Electronic Theses and Dissertations System, July 2002. [26] Bo Lan and Tzekian Tan, “A DRM System Implementing RFID to Protect AV Content,” Consumer Electronics, 2006. ISCE ''06. 2006 IEEE Tenth International Symposium on. [27] Chiu C. Tan, Bo Sheng, and Qun Li, “Secure and Serverless RFID Authentication and Search Protocols,” Wireless Communications, IEEE Transactions on, April 2008. [28] Hong Lei and Tianjie Cao, “RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks,” The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), 1-3 Nov. 2007, pp.508-510. [29] M.J.B Robshaw, “An overview of RFID tags and new cryptographic developments,” information security technical report II, 2006, pp.82–88. [30] I. J. Kim, E. Y. Choi, D. H. Lee, “Secure Mobile RFID system against privacy and security problems,” Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007, pp.67-72. [31] C.M. Roberts, “Radio frequency identification (RFID),” Computers & Security on Volume 25, Issue 1, February 2006, Pages 18-26. [32] R. Angeles, “RFID Technology: supply-chain applications and implementations issues,” Information Systems Management, Vol.22, No.1, 2005, pp. 51-65. [33] S. H. Choi and C. H. Poon, “An RFID-based Anti-counterfeiting System,” LAENG International Journal of Computer Science, 35:1. [34] C. Chatmom, T. V. Le and M. Burmester, “Secure Anonymous RFID Authentication Protocols,” Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA 2006. [35] W. H. Chen, S. W. Wang, C. S. Ong, Li. Liu, and Y. W. Chuang, “RFID Application in Hospitals: A case Study on a Demonstration RFID Project in a Taiwan Hospital,” Proceedings of the 30th Annual Hawaii International Conference, Vol. 8, pp. 184, 2006. [36] S. Dominikus, E. Oswald and M. Feldhofer, “Symmetric Authentication for RFID systems in practice,” ECRYPT Workshop on RFID and Lightweight Crypto, Graz, Austria, July 2005. [37] Batbold Toiruul, KyungOh Lee, “An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems,” IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.9B, September 2006 [38] Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels, “RFID Systems and Security and Privacy Implications,” in Workshop on Cryptographic Hardware and Embedded Systems, pages 454–470. Lecture Notes in Computer Science, 2002. [39] M. Ookuhbo, K. Suzuki, S. Kinoshita, “Cryptographic Approach to a Privacy Friendly Tag,” RFID Privacy WorkshopIT, NOV., 2003. [40] D. Henrici and P. Müller, “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,” Proceedings 2nd of the IEEE Annul Conference on Pervasive Computing and Communications Workshops (PERCOMW’04), 2004. [41] H.W. Kim, S.Y. Lim, H.J. Lee, “Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security,” Hybrid Information Technology, 2006. ICHIT''06. Vol. 2. International Conference on Volume 2, pp. 718-723, 2006. [42] J. Ma, A. Nakamura and R. Huang, “A Random ID Update Scheme to Protect Location Privacy in RFID-based Student Administration Systems,” Database and Expert Systems Applications, Aug. 2005, pp. 22-26. [43] Online Segment Driving Worldwide Movie Rental Market, 2008.11 http://www.giichinese.com.tw/chinese/koan78397-movie-rental.html [44] NETFLIX, © 1997-2009 Netflix, Inc. http://www.netflix.com/ [45] iVideo, Copyright© 1999 WaveThink Technology Inc. http://www.ivideo.com.tw/ [46] Motion Picture Association of America(MPAA) http://www.mpaa.org/ [47] EPCglobal http://www.epcglobalinc.org/home
|