|
參考文獻 1.餘敬虔, “無線射頻辨識防偽機制研究”, 台灣科技大學資訊工程所碩士論文, 2006. 2.黃馨儀, “防偽技術優勢比較及技術移轉模式的評估”, 跨領域科技管理研習班受訓心得報告, 2006 3.鄭博仁、陳林福、陳品儀、謝德鑫, “有價票證防偽架構”, 無線射頻辨識技術與資訊安全應用, 資訊安全技術通訊, 第10卷, 第2期, pp.78-86, 2004. 4.鄭同伯, “RFID EPC無線射頻辨識完全剖析”, 書號. NE20219. 初版日期. 2004/11/23. 5.顏憶茹、張淳智,“物流管理 原理、方法與實例”(Logistics Management Theory, Methods and Cases)前程文化 6.工商時報/物流倉儲專輯2, 2008/1/22 http://enjoyrfid.blogspot.com/2008/01/dhl_30.html 7.科技日報--向仿冒說「不」 業者研發RFID晶片防偽系統 http://www.hope.com.tw/paper/day.asp?PAPER=1&DATE=2006.11.20 8.無線射頻(RFID)創新應用 巡邏系統與供應鏈管理全新里程 http://www.microsoft.com/taiwan/press/2006/11/1115.mspx 9.R. Angeles, “RFID Technology: supply-chain applications and implementations issues”, Information Systems Management, Vol. 22, No. 1, 2005, pp. 51-65. 10.W. H. Chen, S. W. Wang, C. S. Ong, Li. Liu, and Y. W. Chuang, “RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital”, Proceedings of the 39th Annual Hawaii International Conference, Vol. 8 , pp. 184, 2006. 11.E. Courses, T. Surveys, “An Effective Privacy-Preserving RFID Scheme against Desynchronization”, Intelligent Information Hiding and Multimedia Signal Processing, Volume: 2, pp: 659-662, 26-28 Nov. 2007 12.S. H. Choi and C. H. Poon, “An RFID-based Anti-counterfeiting System”, IAENG International Journal of Computer Science, 35:1. 13.C. Chatmon, T. V. Le and M. Burmester, , 2006, “Secure Anonymous RFID Authentication Protocols”, Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA. 14.Descartes, ¨Global Collaborative Logistics And Visibility in Supply Chain”, the Sixth ECR Asia Conference, CJ GLS, 2003 15.S. Dominikus, E. Oswald and M. Feldhofer, “Symmetric authentication for RFID systems in practice”, ECRYPT Workshop on RFID and Lightweight Crypto, Graz, Austria, July (2005) 16.T. Dimitriou, “A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks”, Proceedings of the IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005. 17.D. N. Duc, J. Park, H. Lee and K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning”, The 2006 Symposium on Cryptography and Information Security, 2006 18.D. Delen, B. C. Hardgrave, R. Sharda, “RFID for Better Supply-Chain Management through Enhanced Information Visibility”, Production and Operations Management Society, Vol. 16, No. 5, 2007, pp.613-624. 19.E. Fleisch, “How the Internet of Things can Help to Reduce Illicit Trade”, 2005. 20.S. FOULADGAR, H. AFIFI, "A Simple Delegation Scheme for RFID Systems (SiDeS)", in proceedings of IEEE International Conference on RFID, (Grapevine, TX, March 2007), pp. 1-6. 21.A. Ilic, F. Michahelles, E. Fleisch, “Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains”, PerCom Workshops 2007, pp.337-341. 22.S. L. Garfinkel, A. Juels, R. Pappu, “RFID privacy: An overview of problems and proposed solutions”, IEEE Security & Privacy, Vol. 3, No. 3, pp. 34-43, 2005. 23.A. Juels, R. L. Rivest, M. Szydlo, “The blocker tag: selective blocking of RFID tags for consumer privacy”, Proceedings of the 10th ACM conference on Computer and communications security, pp. 103-111, 2003. 24.A. Juels, “Privacy and Authentication in Low-Cost RFID Tags”, In submission, 2003. 25.A. Juels, “Rfid security and privacy: A research survey”, IEEE Journal on Selected Areas in Communication, vol. 24, no. 2, pp.381 394, February 2006. 26.H. Knospe and H. Pohl, “RFID Security”, Information Security Technical Report, Vol.9, No. 4, pp. 39-50, Dec. 2004. 27.J. P. Kaps, “RFID: RFID Introduction, Present and Future applications and Security Implications”. 28.Kim, J. and H. Kim. Anti-Counterfeiting Solution Employing Mobile. RFID Environment. in TRANSACTIONS ON ENGINEERING,. COMPUTING AND TECHNOLOGY. 2005. 29.M. Lehtonen, F. Michahelles, E. Fleisch, “Trust and Security in RFID-based Product Authentication Systems Authors”, IEEE Systems Journal, Volume 1, Issue 2, pp. 129-144, December 2007. 30.T. Li, G. Wang, Robert H. Deng, “Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols”, JOURNAL OF SOFTWARE, VOL. 3, NO. 3, MARCH 2008. 31.Y. Li, and X. Ding, “Protecting RFID Communications in Supply Chains”, Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007, Singapore, pp.234 - 241. 32.D. Molnar, A. Soppera and D.Wagner, “A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags”, Selected Areas in Cryptography SAC 2005, LNCS 3897,Aug.2005,Kingston,Canada. 33.Organization for Economic Co-Operation and Development(OECD), The economic impact of counterfeiting and privacy,2007 34.M. Ookuhbo, K. Suzuki, S. Kinoshita, ”Cryptographic Approach to a Privacy Friendly Tag”, RFID Privacy WorkshopIT, NOV., 2003. 35.K. Osaka, T. Takagi, K. Yamazaki, O. Takahashi: An Efficient and Secure RFID Security Method with Ownership Transfer. CIS 2006: 778-787 36.D. C. Ranaslnghe, D. W. Engels, P. H. Cole, “Low-cost RFID systems: Confronting security and privacy”, Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004 37.B. Srivastava, “Radio frequency ID technology: The next revolution in SCM” , Business Horizons, Vol. 47, No. 6, 2004, pp. 60-68. 38.J. Saito, J. C. Ryou and K. Sakurai, “Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags”, Embedded and Ubiquitous Computing- EUC 2004, LNCS3207, Aug.2004, Aizu-Wakamatsu City, Japan. 39.D. Struys, “Avoiding Imports of Counterfeited Products at EU Borders (13MB)”, 2005 40.S. Sarma, S. Weis and D. Engels, “Radio-Frequency Identification: Security Risks and Challenges”, In RSA Laboratories Cryptobytes, Vol. 6, No. 1, 2003. 41.T. Staake, F. Thiesse, E. Fleisch, “Extending the EPC Network–The Potential of RFID in Anti-Counterfeiting”, Proceedings of the 2005 ACM symposium on Applied computing, 2005. 42.Y. Seo, T. Asano, H. Lee and K. Kim, " A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags", Proc. Of SCIS 2007, Abstracts pp.122, Jan. 23-26, 2007, Sasebo, Japan. 43.Melanie R. Rieback, B. Crispo and Andrew S. Tanenbaum, RFID Guardian : A Battery Powered Mobile Device for RFID Privacy Management Australasian Conference on Information Security and Privacy ACISP 05, LNCS35, Jul. 2005, Brisbane, Australia. 44.S. Tripathy, S. Nandi, “Robust Mutual Authentication for Low-cost RFID Systems”, Industrial Informatics, 2006 IEEE International Conference, pp. 949-954, Aug. 2006. 45.C. A. Thompson, "Radio frequency tags for identifying legitimate drug products discussed by tech industry," American Journal of Health-System Pharmacy, vol. 16, no. 14, 2004, pp. 1430-1431. 46.P. Tuyls, L. Batina, “RFID-tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.): Topics in Cryptology-CT-RSA, Lecture Notes in Computer Science, No. 115131, Springer Verlag, San Jose (2006). 47.S. A. Wei, “Security and Privacy in Radio-Frequency Identification Devices”, Masters Thesis. MIT. May, 2003. 48.Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, “Cryptography and authentication on RFID passive tags for. apparel products”, Computers in Industry, Volume 57, Issue. 4, Pages 342-349, May 2006. 49.S. S. Yeo, J. Kwak, “Privacy Enhanced Authentication Protocol for RFID Tag System Security”, Vol. 7 No. 9 pp. 1-6, 2007 50.S. Yu, K. Ren, W. Lou, “A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags” - Military Communications Conference, 2007. MILCOM 2007. IEEE, 2007 51.J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, “Mutual authentication protocol for low-cost RFID”, Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005. 52.ABI Research(2007 Q1) http://www.rfid.org.tw/actfile/1_08080900.pdf 53.Autoid http://www.autoid.org/2002_Documents/sc31_wg4/docs_501-520/520_18000-7_WhitePaper.pdf 54.Auto-ID Labs, “Towards an Anti-Counterfeiting Business Case Framework”, 2006 http://www.autoidlabs.org/fileadmin/events/epcglobalus06/II01_Thorsten_Staake_AC_Business_Calculator.pdf 55.CBP web site http://www.cbp.gov/xp/cgov/trade/priority_trade/ipr/seizure/seizure_stats.xml 56.EPCglobal http://www.epcglobalinc.org/standards/uhfc1g2/uhfc1g2_1_1_0-standard-20071017.pdf 57.EPCglobal Hong Kong http://www.epcglobal.org.hk/modules.php?name=Content&pa=showpage&pid=80 58.EPCglobal HK http://www.epcglobal.org.hk/modules.php?name=Content&pa=showpage&pid=81 59.IDTechEx http://www.idtechex.com/ 60.RFID Journal, http://www.rfidjournal.com/. 61.RFIDWORLD web site, www.rfidworld.com.cn 62.RFID: Radio Frequency IDentification: Applications and Implications for Consumers: A Workshop Report From the Staff of the Federal Trade Commission (March 2005)
|