[4] D. Henrici and P. Muller, “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,” in Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PerCom'04), Orlando, Florida, USA, March 14-17, 2004, pp. 149-153.
[12] Y. Chen, J.S. Chou, H.M. Sun, “A Novel Mutual Authentication Scheme based on Quadratic Residues for RFID Systems,” Computer Networks, Vol. 52, No.12, August 22, 2008, pp. 2373-2380.
[17] H.Y. Chien and C.H. Chen, “Mutual Authentication Protocol for RFID Conforming to EPC Class1 Generation 2 Standards,” Computer Standards & Interfaces, Vol.29, No.2, February 2007, pp. 254-259.
Lin, H., Su, P. C., Chang, H. K. C., & Liu, A. T. (2018). RFID的隱私保護和自我認證協議設計. 致理學報, (38), 1-30. https://www.airitilibrary.com/Article/Detail?DocID=19945728-201811-201811080019-201811080019-1-30