Author: |
陳筱玫 Siao-Mei Chen |
---|---|
Thesis Title: |
基於低成本RFID標籤之群組證明協定 Grouping Proof Protocols based on Low-cost RFID Tags |
Advisor: |
羅乃維
Nai-Wei Lo |
Committee: |
吳宗成
Tzong-Chen Wu 葉國暉 Kuo-Hui Yen |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2013 |
Graduation Academic Year: | 101 |
Language: | 英文 |
Pages: | 37 |
Reference times: | Clicks: 442 Downloads: 5 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
[1] S. Piramuthu, “On Existence Proofs for Multiple RFID Tags,” In Proceedings of the 2006 IEEE International Conference on Pervasive Services, pp.26-29, June 2006.
[2] C.-C. Lin, Y.-C. Lai, J.-D. Tygar, C.-K. Yang, C.-L. Chiang, “Coexistence proof using chain of timestamps for multiple RFID tags,” In Proceedings of the 2007 International workshop on database management and application over networks, pp. 634–643, June 2007.
[3] H.-Y. Chien, C.-C. Yang, T.-C. Wu, and C.-F. Lee, “Two RFID-based solutions to enhance inpatient medication safety,“ Journal of Medical Systems, vol.35, pp. 369-375, June 2011.
[4] H.-Y. Chien and S.-B. Liu, “Tree-based RFID yoking proof,” In Proceedings of the 2009 International Conference on Networks Security, Wireless Communica-tions and Trusted Computing, vol.1, pp.550–553, April 2009.
[5] N.-W. Lo and K.-H. Yeh, ”Anonymous Coexistence Proofs for RFID Tags,” Journal of Information Science and Engineering, vol. 26, no. 4, pp. 1213-1230, July 2010.
[6] EPCglobal Inc, Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz (version 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
[7] P. Peris-Lopez, A. Orfila, et al., “Flaws on RFID grouping-proofs. Guidelines for future sound protocols,” Journal of Network and Computer Applications, vol. 34, no. 3, pp. 833–845, May 2011.
[8] H.-H. Huang, and C.-Y. Ku, ”A RFID grouping proof protocol for medication safety of inpatient,” Journal of Medical Systems, vol. 33, pp. 467–474, December 2009.
[9] A.-K. Wickboldt, and S. Piramuthu, ” Patient safety through RFID: Vulnerabili-ties in recently proposed grouping protocols,” Journal of Medical Systems, vol. 36, pp. 431-435, April 2010.
[10] Y.-C. Yu, T.-W. Hou, and T.-C. Chiang, “Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety,“ Journal of Medical Systems, vol. 36, pp. 823-828, April 2012.
[11] S. Wu, K. Chen, and Y. Zhu, “A Secure Lightweight RFID Binding Proof Proto-col for Medication Errors and Patient Safety,” Journal of Medical Systems, vol. 36, pp. 2743–2749, October. 2012.
[12] C. Ma, J. Lin, Y. Wang, and M. Shang, “Offline RFID Grouping Proofs with Trusted Timestamps,” In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674-681, June 2012
[13] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,” In Proceeding of Workshop on RFID Security – RFIDSec 06, July 2006.
[14] M. Barasz, B. Boros, P. Ligeti, K. Loja, and D. Nagy, “Breaking LMAP,” In Proceeding of Workshop on RFID Security – RFIDSec 07, July 2007.
[15] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification,” Journal of Computer Standards and Interfaces, vol. 31, pp. 88–97, Jan. 2009.
[16] P. Peris-Lopez, A. Orfila, A. Mitrokotsa, and J. C.A. van der Lubbe, “A compre-hensive RFID solution to enhance inpatient medication safety,” International Journal of Medical Informatics, vol. 80, issue 1, pp. 13–24, Jan. 2011.
[17] A. Juels, “Yoking-proofs for RFID tags,” In Proceeding of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138–143, 2004.
[18] J. Saito and K. Sakurai, “Grouping proof for RFID tags,” In Proceeding of the 19th International Conference on Advanced Information Networking and Appli-cations, vol. 2, pp. 621–624, 2005.
[19] L. Bolotnyy and G. Robins, “Generalized yoking-proofs for a group of RFID tags” In Proceeding of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–4, 2006.
[20] L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” In Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 40–48, June 2009.
[21] Institute of Medicine of the National Academies, http://www.iom.edu/Reports.aspx.
[22] S. Y. Crawford, M. R. Cohen, and E. Tafesse, “Systems factors in the reporting of serious medication errors in hospitals,” Journal of Medical Systems, vol. 27, Issue 6, pp.543–551, Dec . 2003.
[23] S. M. Walton, “The pharmacist shortage and medication errors: Issues and evi-dence,” Journal of Medical Systems, vol.28, pp. 63–59, 2004.
[24] M. Burmester, B. de Medeiros, R. Motta, “Provably secure grouping-proofs for RFID Tags,” In Proceedings of the 2008 8th smart card research and advanced applications, pp. 176-190, September2008.
[25] X. Leng, Y. Lien, K. Mayes, K. Markantonakis, J.-H. Chiu, “Select-response grouping proof for RFID tags,” In Proceedings of the 2009 First Asian Confer-ence on Intelligent Information and Database Systems, pp.73–77, April 2009.
[26] EPCglobal Inc, EPC Class-1 HF RFID Air Interface Protocol for Communica-tions at 13.56 MHz (version2.0.3). Retrieved from EPCglobal Inc, Class-1 Gen-eration-2 UHF RFID protocol for communications at 860 MHz - 960 MHz (ver-sion 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
[27] S.-H. Ching, and A. Tai, “HF RFID versus UHF RFID — Technology for Library Service Transformation at City University of Hong Kong,” The Journal of Academic Librarianship, vol. 35, pp. 347–359, July 2009.
[28] EPCglobal Inc, GS1 EPC Tag Data Standard (version 1.6). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_6-RatifiedStd-20110922.pdf