参考文献
|
-
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2009:0278:FIN:EN:PDF (2013/9).
-
http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_V1-1.pdf (2013/9).
-
http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf (2013/9).
-
Atzori, L.,Iera, A.,Nirabuti, G.(2010).The Internet of Things: A Survey.Computer Network,54,2787-2805.
-
Birari, S.M.,Iyer, S.(2005).PULSE: A MAC Protocol for RFID Networks.Lecture Notes Computer Science,3823,1036-1046.
-
de Leusse, P.,Periorellis, P.,Dimitrakos, T.,Nair, S.K.(2009).Self Managed Security Cell - a Security Model for the Internet of Things and Services.First International Conference on Advances in Future Internet
-
Fung, B.,Al-hussaeni, K.,Cao, M.(2009).Preserving RFID Data Privacy.IEEE International Conference on RFID
-
Gu, Y.,Wu, W.(2009).Mutual Authentication Protocol based on Tag ID Number Updating for Low-cost RFID.IEEE International Conference on Network Infrastructure and Digital Content (ICNIDC 09)
-
Hwang, K.,Kim, K.,Eom, D.(2006).DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.Lecture Notes Computer Science,4097,413-422.
-
Juels, A.,Rivest, R.L.,Szydlo, M.(2003).The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.Proceedings of the 10th ACM Conference on Computer and Communications Security
-
Julius, Ho,Engels, D.W.,Sarma, S.E.(2006).HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem.Proceedings of the International Symposium on Applications and the Internet Workshops
-
Karabat, C.(2009).A Novel Secure RFID System to Ensure Privacy.Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 09)
-
Kim, E.,Kwon, T.,Yi, J.H.(2010).A Study of Mobile Proxy for Privacy Enhancement.Digest of Technical Papers International Conference on Consumer Electronics
-
Kim, J.,Lee, W.,Jung, J.,Choi, J.,Kim, E.,Kim, J.(2005).Weighted Localized Clustering: A Coverage-Aware Reader Collision Arbitration Protocol in RFID Networks.Embedded Software and Systems, Proceedings
-
Kim, J.,Lee, W.,Yu, J.,Myung, J.,Kim, E.,Lee, C.(2005).Effect of Localized Optimal Clustering for Reader Anti-collision in RFID Networks: Fairness Aspects to the Readers.IEEE International Conference on Computer Communications and Networks
-
Lai, Y.C.,Hsiao, L.Y.(2010).General Binary Tree Protocol for Coping with the Capture Effect in RFID Tag Identification.Communication Letters, IEEE,14,208-210.
-
Lee, Y.C.,Hsieh, Y.C.,You, P.S.,Chen, T.C.(2009).A New Ultralightweight RFID Protocol with Mutual Authentication.International Conference on Information Engineering (ICIE 09)
-
Lin, C.F.,Lin, Y.S.(2007).A Simulated Annealing Algorithm for RFID Reader Networks.IEEE Wireless Communications and Networking Conference (WCNC 07)
-
Miorandi, D.,Sicari, S.,De Pellegrini, F.,Chlamtac, I.(2012).Internet of Things: Vision, Applications and Research Challenges.Ad Hoc Networks,10,1497-1516.
-
Mohammed, U.S.,Salah, M.(2009).Parallel Binary Tree Splitting Protocol for Tag Anti-collision in RFID Systems.4th International Design and Test Workshop (IDT)
-
O'Neill, M.,Robshaw, M.J.B.(2010).Low-cost Digital Signature Architecture Suitable for Radio Frequency Identification Tags.Computers & Digital Techniques, IET,4,14-26.
-
Roman, R.,Najera, P.,Kioez, J.(2011).Securing the Internet of Things.IEEE Computer,44,51-58.
-
Sadighian, A.,Jalili, R.(2009).AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems.Third International Conference on Emerging Security Information, Systems and Technologies
-
Sarma, S. E.,Weis, S. A.,Engels, D. W.(2003).Radio-frequency Identification: Secure Risks and Challenges.RSA Laboratories Cryptobytes,6,2-9.
-
Song, I.C.,Hong, S.H.,Chang, K.H.(2009).An Improved Reader Anti-collision Algorithm based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode.IEEE 69th Vehicular Technology Conference
-
Tong, Q.,Zou, X.,Tong, H.(2009).Dynamic Framed Slotted ALOHA Algorithm Based on Bayesian Estimation in RFID System.2009 WRI World Congress on Computer Science and Information Engineering(CSIE)
-
Urien, P.,Chabanne, H.,Bouet, M.,de Cunha, D.O.,Guyot, V.,Pujolle, G.,Paradinas, P.,Gressier, E.,Susini, J.F.(2007).HIP-based RFID Networking Architecture.IFIP International Conference on Wireless and Optical Communications Networks
-
Urien, P.,Elrharbi, S.,Nyamy, D.,Chabanne, H.,Icart, T.,Pepin, C.,Bouet, M.,Cunha, D.,Guyot, V.,Krznik, P.,Susini, J.F.(2008).HIP-Tags: a New Paradigm for the Internet of Things.WirelessDays, 1st IFIP
-
Urien, P.,Elrharbi, S.,Nyamy, D.,Chabanne, H.,Icart, T.,Pepin, C.,Bouet, M.,Cunha, D.,Guyot, V.,Krznik, P.,Susini, J.F.(2009).HIP-Tags Architecture Implementation for the Internet of Things.First Asian Himaalayas International Conference on Internet
-
Waldrop, J.,Engels, D.W.,Sanna, S.E.(2003).Colorwave: An Anti-collision Algorithm for the Reader Collision Problem.IEEE International Conference on Communications(ICC 03)
-
Wang, D.,Wang, J.W.,Zhao, Y.P.(2006).A Novel Solution to the Reader Collision Problem in RFID System.Proc. IEEE Wireless Communications, Networking and Mobile Computing(WiCOM 06)
-
Weber, R. H.(2010).Internet of Things - New Security and Privacy Challenges.Ad Hoc Networks,26,23-30.
-
Weis, S.A.,Sarma, S.E.,Rivest, R.L.,Engels, D.W.(2004).Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems.Security in Pervasive Computing,2802,201-212.
-
WU, K.,Liu, Y.(2010).A New Energy-Aware Scheme for RFID System Based on ALOHA.The second International Conference on Future Networks(ICFN 10)
-
Yang, M.H.,Luo, J.N.(2009).Authentication Protocol in Mobile RFID Network.Fourth International Conference on Systems
-
Yao, Q.,Qi, Y.,Han, J.,Zhao, J.,Li, X.,Liu, Y.(2009).Randomizing RFID Private Authentication.IEEE International Conference on Pervasive Computing and Communications
-
周洪波、李吉生、趙曉波(2010)。輕鬆讀懂物聯網─技術、應用、標準和商業模式。臺北:博碩文化股份有限公司。
|