|
英文參考文獻 1.Chien, H. Y. & Jan, J. K.(2003). Robust and simple authentication protocol. The Computer Journal, 46(2), 193. 2.Coates, A. L., Baird, H. S. & Faternan, R.(2001). Pessimal print: A reverse turing test. 3.Diffie, W. & Hellman, M.(1976). New directions in cryptography. Information Theory, IEEE Transactions on, 22(6), 644-654. 4.Elson, J., Douceur, J. R., Howell, J. & Saul, J.(Asirra: A captcha that exploits interest-aligned manual image categorization. CCS, 7, 366–374. 5.Evans Jr, A., Kantrowitz, W. & Weiss, E.(1974). A user authentication scheme not requiring secrecy in the computer. Communications of the ACM, 17(8), 437-442. 6.Haller, N.(1995). The s/key one-time password system. 7.Hwang, M. S.(1999). Cryptanalysis of a remote login authentication scheme* 1. Computer Communications, 22(8), 742-744. 8.Lamport, L.(1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770-772. 9.Lin, M. H.(2009). A study of captcha schemes for a mobile device. 10.Mori, G. & Malik, J.(2003).Recognizing objects in adversarial clutter: Breaking a visual captcha. 11.Moy, G., Jones, N., Harkless, C. & Potter, R.(2004). Distortion estimation techniques in solving visual captchas. 12.Ozeki, H.(2009). Oblivious captcha: A fifth-factor technology for practical captcha use. Information and Media Technologies, 4(2), 509-514. 13.page, T. C. w. http://www.captcha.net. 14.Pope, C. & Kaur, K.(2005). Is it human or computer? Defending e-commerce with captchas. IT professional, 43-49. 15.Sun, H. M.(2000). An efficient remote use authentication scheme using smart cards. Consumer Electronics, IEEE Transactions on, 46(4), 958-961. 16.Tsuji, T., Kamioka, T. & Shimizu, A.(2002). Simple and secure password authentication protocol, ver. 2 (sas-2). OIS,102(314), 7-11. 17.Tsuji, T. & Shimizu, A.(2002). Algorithm variations of sas-2. IEIC Technical Report (Institute of Electronics, Information and Communication Engineers), 102(498), 25-30. 18.Van Oorschot, P. C., Menezes, A. J. & Vanstone, S. A.(1996). Handbook of applied cryptography:Crc Press. 19.Wikipedia. http://en.wikipedia.org/wiki/S/KEY. 20.Wilkes, M. V. & Vincent, M.(1972). Time-sharing computer systems: Macdonald and Co. 中文參考文獻 21.王崑仰(民98)。結合一次性密碼與web service運用於資料交換之可行性研究。國防大學管理學院資訊管理學系。 22.洪清波(民94)。以單向雜湊函數為基礎之認證機制。樹德科技大學資訊工程學系。 23.徐志翔(民98)。探討年齡對文字驗證碼工作之影響。朝陽科技大學工業工程與管理系。 24.創市際網路社群篇(2011)。http://www.insightxplorer.com/specialtopic/2009_8_blog.htm。 25.騰訊QQ令牌的安全性分析(2010)。http://goo.gl/nNWLO。 26.聽忍太郎講五四三(2010)。http://goo.gl/xUv0q。
|