參考文獻
一、中文部分
陳宣凱(2010),驗證加密表單應用於新聞儲存及播放之研究,中國文化大學資訊管理研究所未出版之碩士論文。黃竣柏(2010),架構新聞資料收集與發布的安全環境之研究,中國文化大學資訊管理研究所未出版之碩士論文。王旭正,柯宏叡(2004),密碼學與網路安全,台北:碩博文化。
張真誠(1990),電腦密碼學與資訊安全,台北:松崗出版社。
灘天佑(2008),資訊安全概論與實務,台北:碁峰資訊。
鄧安文(2006),密碼學,台北:全華科技。
二、英文部分
Biham. E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystem. Advances in Cryptol¬ogy-CRYPTO ’90 Proceedings, Springer-Verlag Berlin, 2-21.
Denning, D. (1982). Cryptography and data security. Addison-wesley.
Diffie, W., & Hellman, M. E. (1976). New directions in cryptogra-phy , IEEE Trans. on Inform Theory, 644-654.
Biham, E. L. R. (1998). Knudsen. DES, Triple-DES and AES. CryptoBytes, 4(1),18-23.
Lee, H. M., Lee, T. Y., Lin, L., & Su, J. S. (2007). Cipher text con-taining data and key to be transmitted in network security, Proceeding of the 11Th WSEAS Interna¬tional Conference on System (CSCC’07) Agios Nikolaos, Crete Island, Greece July 23-28, pp.275-279.
Lee, H. M., & Lee, T. Y. (2007). Analysis of algorithm of cipher text containing data and key in network secu¬rity. The Second International Conference on Innova¬tive Computing, Informa-tion and Control , Kumamoto City International Center, Ku-mamoto, Ja¬pan.
Lee, H. M., & Lee, T. Y. (2010). Verification of stored security data in computer system, N.T. Nguyen, M.T. Le, and J. Swiątek (Eds): ACIIDS 2010, Part I, LNAI 5990, pp. 426-434.
Lee, H. M., & Lee, T. Y. (2007). Analysis of algorithm of cipher text containing data and key in net¬work security. Paper presented at Second International Confe¬rence on Innovative Computing Information and Con¬trol, Kumamoto, Japan.
Lee, H. M., & Lee, T. Y. (2010). Verification of stored security data in computer system. Paper pre¬sented at the Second Asian Conference on Intelligent Informa¬tion and Database Systems, Hue, Vietnam.
Lee, H. M., Lee, T. Y., Lin, L., & Su, J. S. (2007). Cipher text containing data and key to be transmit¬ted in network security. In Proceedings of the 11th WSEAS International Conference on System, Crete Isl¬and, Greece.
Lee, H. M., & Lee, T. Y. (2006). Encryption and decryption algo-rithm of data transmission in network security. WSEAS Transactions on Information Science and Applica¬tions, 3(12), 2557-2562.
Chen, H. S., Lee, T. Y., & Lee, H. M. (2010). Processing Certificate of Authorization with Watermark Based on Grid Environment. ICCCI 2010, Part II, LNAI 6422, 324-333.
Matsui, M. (1994). Linear cryptanalysis method for DES cipher In T. Helleseth, Editor, Advances in Cryptology (CRYPT”O’90). Lecture Notes in Computer Science. 765, Springer-Verlag Berlin Heidelberg New York, 386-397.
McEliece, R. J. (1978). A public-key system based on algebraic coding theory, Deep Sace Network Progress Report, 44, Jet Propulsion Laboratory, California Insti¬tute of Technology, 114-116.
Merkle, R. C. (1990). One way hash function and DES, Proc. Crypto’89, Springer-Verlag Berlin, 428-446.
Miyaguchi, S. (1990). The FEAL-8 cryptosystem and call for attack, Advances in Cryptology-CRYPTO’89 proceedings, Sprin¬ger Verlag Berlin, 624-627.
Pieprzyk, J., & Hardjono, T., Seberry, J. (2003). Fundamentals of computer security, Springer-Verlag Berlin Heidelberg.
Rivest, R. L., & Shamir, A. L. (1978). Adleman, A method for ob-taining digital signatures and public key cryptosys¬tems, Communications of the ACM, 21(2), 120-126.
Shannon, C. (1949). Communication theory of security systems, Bell System Technical Journal, 28, 657-715.
Stallings, W. (2003). Cryptography and network security, Principles and Practices, International Edition, Third Edition 2003 by Pearson Education, Inc. Upper Saddle River, NJ 07458.
Stallings, W. (2003). Network security essentials application and standards, Second Edition 2003 by Pearson Educa¬tion, Inc. Upper Saddle River, NJ 0745.