|
參考文獻 [1] J. Ayoade, ”Roadmap to solving security and privacy concerns in RFID systems”, Computer Law & Security Report , Vol. 22, no. 6, pp. 555-561, 2006 [2] Benetton undecided on use of ‘smart tags’, Associated Press, 8 April 2003 [3] http://www.capgemini.com/ , Cap Gemini Ernst & Young [4] Hung-Yu Chien, Chi-Sung Laih, “ECC-based lightweight authentication protocol with un-traceability for low-cost RFID, J. Parallel Distrib. Comput, Vol. 69, no. 10, pp. 848-853, 2009 [5]B. Eckfeldt, “what does RFID do for the consumer?”, Communications of the ACM, Vol. 48 no.9, pp.77-9, 2005 [6]http://www.epcglobalinc.org/home,EPCglobal [7]A.D. Henrici, P. MÄuller,“Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers”, in the Proc. of PerSec''04 at IEEE PerCom, , 2004, pp.149-153 [8]C. Hurjui, C. Turcu, A. Graur, “Management System of the Products on Warranty Based on RFID technologies”, Optimization of Electrical and Electronic Equipment (OPTIM 2008), 2008, pp.231-236 [9]G. Hariton, J.Lawford, H. Palihapitiya, “Radio Frequency Identification and Privacy: Shopping Into Surveillance”, Public Interest Advocacy Centre, 2006, accessed at http://www.piac.ca/files/rfid.pdf [10]A. Juels, R.L. Rivest, and M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, In the Proc. of Tenth ACM Conference on Computer and Communications Security, October 2003, pp.103-111. [11]A. Juels, “Yoking proof for RFID tags”, in the Proc. of Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp.138–143. [12]H. Knospe, H. Pohl, "RFID Security", Information Security Technical Report, Vol. 9, no. 4, pp.39-50 , Dec 2004. [13]S. Kinoshita, M. Ohkubo, F. Hoshino, G.M. rohashi, O. Shionoiri, and A. Kanai, “Privacy enhanced active RFID tag”, In Proc. of the International Workshop on Exploiting Context Histories in Smart Environments–ECHISE’05, Munich, Germany, May 2005 [14]A.X. Liu and L.A. Bailey,”A privacy and authentication protocol for passive RFID tags”, Computer Communications, Vol. 32, no. 7-10, pp.1194-1199, May 2009 [15]http://www.metrogroup.eu/servlet/PB/menu/1183670_l2/index.html, Metro Group [16]G. Karjoth and P.Moskowitz, "Disabling RFID tags with visible confirmation: Clipped tags are silenced", in the Proc. of the 2005 ACM workshop on Privacy in the electronic society, 2005, pp.27-30 [17]Eun-Kyung Ryua, Tsuyoshi Takagi, “ A hybrid approach for privacy-preserving RFID tags”, Computer Standards & Interfaces, Vol. 31, no. 4, pp.812-815, June 2009, [18]S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, ”Security and Privacy Aspects of Low-Cost RFID Systems” , in the Proc. of International Conference on Security in Pervasive Computing, 2003, pp.201-212. [19]S.A.Weis, “Security and Privacy in Radio-Frequency Identification Devices”, Master''s thesis, Massachusetts Institute of Technology, May 2003, ch5.1 [20]J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, “Mutual authentication protocol for low-cost RFID", in: Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005, pp.17-24 [21] Metro future store, Youtube, http://www.youtube.com/watch?v=oHKcDTY2v7s [22]Future Store (Smart Check Out), Youtube, http://www.youtube.com/watch?v=zBz3aoikLpU&feature=related [23] Future store, Youtube, http://www.youtube.com/watch?v=gUcuqhduWao
|