|
Bibliography [1]R. Y. Zhong, Q. Y. Dai, T. Qu, G. J. Hu, and G. Q. Huang, “RFID-enabled real-time manufacturing execution system for mass-customization production,” Robotics and Computer-Integrated Manufacturing, vol. 29, no. 2, pp. 283–292, 2013. [2]D. H. Williams, “The Strategic Implications of Wal-Mart’s RFID Mandate,” Directions, July 2004. [3]Y. Y. Chen, D. C. Huang, M. L. Tsai, and J. K. Jan, “A Design of Tamper Resistant Prescription RFID Access Control System,” Journal of Medical Systems, vol. 36, no. 5, pp. 2795–2801, 2012. [4]S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science, pp. 201–212, 2004. [5]H. Y. Chien, ”Secure Access Control Schemes for RFID Systems with Anonymity,” International Conference On Mobile Data Management, pp. 96–99, 2006. [6]Y. Y. Chen, M. L. Tsai, and J. K. Jan, “The Design of RFID Access Control Protocol using the Strategy of Indefinite-Index and Challenge-Response,” Computer Communications, vol. 34, no. 3, pp. 250–256, 2011. [7]A. R. Sadeghi, I. Visconti, and C. Wachsmann, “User Privacy in Transport Systems Based on RFID E-Tickets,” In Workshop on Privacy in Location-Based Applications (PiLBA), October 2008. [8]K. Peng and F. Bao, “A Secure RFID Ticket System for Public Transport,” In DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, vol. 6166, pp. 350–357, 2010. [9]K. C. Tan, “A Framework of Supply Chain Management Literature,” European Journal of Purchasing & Supply Management, vol. 7, no. 1, pp. 39–48, 2001. [10]M. Chen, S. Gonzalez, V. Leung, Q. Zhang, and M. Li, ”A 2G-RFID-BASED E-HEALTHCARE SYSTEM,” IEEE Wireless Communications, vol. 17, no. 1, pp. 37–43, 2010. [11]M. Chen, “Towards smart city: M2M communications with software agent intelligence. Multimedia Tools and Applications,” Multimedia Tools and Applications, pp. 1–12, 22 February 2012. [12]L. Boquete, R. Cambralla, J. M. Rodriguez-Ascariz, J. M. Miguel-Jimenez, J. J. Cantos-Frontela, and J. Dongil, “Portable system for temperature monitoring in all phases of wine production,” ISA Transactions, vol. 49, no. 3, pp. 270–276, 2010. [13]Samuel Fosso Wamba, “Guest Editorial for the Special Issue on RFID-enabled Healthcare: Applications, Issues and Benefits,” Journal of Medical Systems, vol. 36, no. 6, pp. 3389–3392, 2012. [14]Robert G. Fichman, Rajiv Kohli and Ranjani Krishnan, “Editorial Overview-The Role of Information Systems in Healthcare: Current Research and Future Trends,” Information Systems Research, vol. 22, no. 3, pp. 419–428, 2011. [15]E.W.T. Ngai, Karen K.L. Moon, Frederick J. Riggins and Candace Y. Yi, “RFID research: An academic literature review (1995–2005) and future research directions,” International Journal of Production Economics, vol. 112, no. 2, pp. 510–520, 2008. [16]Samir El-Masri and Basema Saddik, “An Emergency System to Improve Ambulance Dispatching, Ambulance Diversion and Clinical Handover Communication—A Proposed Model,” Journal of Medical Systems, vol. 36, no. 6, pp. 3917–3923, 2012. [17]E. Abad, F. Palacio, M. Nuin, A. Gonzalez de Zarate, A. Juarros, J. M. Gomez, and S. Marco, “RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain,” Journal of Food Engineering, vol. 93, no. 4, pp. 394–399, 2009. [18]R. Jedermann, L. Ruiz-Garcia, and W. Lang, “Spatial temperature profiling by semi-passive RFID loggers for perishable food transportation,” Computers and Electronics in Agriculture, vol. 65, no. 2, pp. 145–154, 2009. [19]Y. S. Kang, H. Jin, O. Ryou, and Y. H. Lee, “A simulation approach for optimal design of RFID sensor tag-based cold chain systems,” Journal of Food Engineering, vol. 113, no. 1, pp. 1–10, 2012. [20]Wan Tang, Jin Ni, Min Chen and Ximin Yang, “Contextual Role-based Security Enhancement Mechanism for 2G-RFID Systems,” The First International Workshop on Security in Computers, Networking and Communications, pp. 959–963, 2011. [21]FDA Food Safety Modernization Act (FSMA), Available from: < http://www.fda.gov/Food/GuidanceRegulation/FSMA/default.htm >, Accessed 1 July 2013. [22]S. Q. Luo, “The model and assessment of produce traceability system over the cloud in America,” Available from: < http://www.twfoodtrace.org.tw/expert_detail.php?info_id=227 >, Accessed 1 July 2013. [23]A. Regattieri, M. Gamberi, and R. Manzini, “Traceability of food products: General framework and experimental evidence,” Journal of Food Engineering, vol. 81, no. 2, pp. 347–356, 2007. [24]J. P. Munoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, and J. C. Sanchez-Aarnoutse, “Implementation of traceability using a distributed RFID-based mechanism,” Computers in Industry, vol. 61, no. 5, pp. 480–496, 2010. [25]T. Bosona and G. Gebresenbet, “Food traceability as an integral part of logistics management in food and agricultural supply chain,” Food Control, vol. 33, no. 1, pp. 32–48, 2013. [26]I H. Hong, J. F. Dang, Y. H. Tsai, C. S. Liu, W. T. Lee, M. L. Wang, and P. C. Chen, “An RFID application in the food supply chain: A case study of convenience stores in Taiwan,” Journal of Food Engineering, vol. 106, no. 2, pp. 119–126, 2011. [27]J. Feng, Z. Fu, Z. Wang, M. Xu, and X. Zhang, “Development and evaluation on a RFID-based traceability system for cattle/beef quality safety in China,” Food Control, vol. 31, no. 2, pp. 314–325, 2013. [28]J. P. Qian, X. T. Yang, X. M. Wu, L. Zhao, B. L. Fan, and B. Xing, “A traceability system incorporating 2D barcode and RFID technology for wheat flour mills,” Computers and Electronics in Agriculture, vol. 89, pp. 76–85, 2012. [29]L. Atzori, A. lera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. [30]D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Personal Communications, vol. 58, no. 1, pp. 49–69, 2011. [31]Y. Y. Chen, Y. J. Wang, and J. K. Jan, “A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System,” Journal of Medical Systems, vol. 37, no. 3, pp. 1–10, 2013. [32]D. M. Dobkin and T. Wandinger, “A Radio-Oriented Introduction to Radio Frequency Identification,” High Frequency Electronics, pp. 46–54, 2005. [33]“Jet pilot busted for flying with a fake license,” Available from: < http://www.cnn.com/2010/WORLD/europe/03/04/netherlands.pilot.fake.license/index.html >, Accessed 26 Dec 2013. [34]“Was 'nurse of the year' fake?” Available from: < http://edition.cnn.com/video/data/2.0/video/bestoftv/2009/08/07/pn.nurse.of.year.fake.cnn.html >, Accessed 26 Dec 2013. [35]“Tens of thousands of forged certificates have been found by the police,” Available from: < http://big5.xinhuanet.com/gate/big5/yn.xinhuanet.com/newscenter/2010-06/27/content_20178437.htm >, Accessed 26 Dec 2013. [36]“Manila's forgers graduate with honors from 'Recto University',” Available from: < http://www.cnn.com/2012/01/17/world/asia/philippines-recto/index.html >, Accessed 26 Dec 2013. [37]“The hometown of forged certificates,” Available from: < http://big5.huaxia.com/gd/rdjj/00213993.html >, Accessed 26 Dec 2013. [38]“To identify fake certificates rely on professional education authentication institution,” Available from: < http://news.sina.com.tw/article/20130114/8763623.html >, Accessed 26 Dec 2013. [39]Global Credential Verification. Available from: < http://verify.certiport.com/ >, Accessed 26 Dec 2013. [40]Yu-Ting Yang, ”A study on the anti-counterfeit for applying RFID to the land ownership certificate,” Zhongxing Land Office, Taichung City, 2005. [41]Chia-Ho Lee, Chih-Yi Lin, Hwong-Wen Ma and Sio-Hang Ng, “The Incentive Mechanism with RFID Technology for Suppliers to Design Environmentally-Friendly Electrical and Electronic Equipment,” Procedia-Social and Behavioral Sciences, vol. 57, pp. 339–345, 2012. [42]Cosmin Condea, Frederic Thiesse and Elgar Fleisch, “RFID-enabled shelf replenishment with backroom monitoring in retail stores,” Decision Support Systems, vol. 52, no. 4, pp. 839–849, 2012. [43]Shuai Liu, Dongyong Zhang, Rong Zhang and Bin Liu, “Analysis on RFID operation strategies of organic food retailer,” Food Control, vol. 33, no. 2, pp. 461–466, 2013. [44]Jiang-Liang Hou and Ting-Gin Chen, “An RFID-based Shopping Service System for retailers,” Advanced Engineering Informatics, vol. 25, no. 1, pp. 103–115, 2011. [45]Kirk H.M. Wong, Patrick C.L. Hui and Allan C.K. Chan, “Cryptography and authentication on RFID passive tags for apparel products,” Computers in Industry, vol. 57, no. 4, pp. 342–349, 2006. [46]W.K. Wong, S.Y.S. Leung, Z.X. Guo, X.H. Zeng and P.Y. Mok, “Intelligent product cross-selling system with radio frequency identification technology for retailing,” International Journal of Production Economics, vol. 135, no. 1, pp. 308–319, 2012. [47]W. Wen, “An intelligent traffic management expert system with RFID technology,” Expert Systems with Applications, vol. 37, no. 4, pp. 3024–3035, 2010. [48]Keith E. Mayes, Konstantinos Markantonakis and Gerhard Hancke, “Transport ticketing security and fraud controls,” Information Security Technical Report, vol. 14, no. 2, pp. 87–95, 2009. [49]Ilias P. Vlachos, “A hierarchical model of the impact of RFID practices on retail supply chain performance,” Expert Systems with Applications, vol. 41, no. 1, pp. 5–15, 2013. [50]Jinpeng Xu, Wei Jiang, Gengzhong Feng and Jun Tian, “Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain,” European Journal of Operational Research, vol. 221, no. 1, pp. 213–221, 2012. [51]Szu-Min Yang, Yu-Yi Chen and Jinn-Ke Jan, “The study of anti-counterfeiting RFID certificate-The implementation on athletic games,” National Chung Hsing University, 2011.
|