[1]張真誠,電腦密碼學與資訊安全,台北:松崗,1989。
[2]賴溪松,韓亮,張真誠,近代密碼學及其應用,台北:松崗,1998。
[3]賴溪松,葉育斌,資訊安全入門,台北:全華,2004。
[4]鄧安文,加密演算與密碼分析計算實驗,台北:全華,2006。
[5]陳曉萍,資料庫加密與驗證之研究,朝陽科技大學資訊管理系未出版碩士論文,2002。[6]Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant and Yirong Xu, “Order Preserving Encryption for Numeric Data,” SIGMOD, 563-574, 2004.
[7]Mihir Bellare, Joe Kilian, Phillip Rogaway, “The Security of the Cipher Block Chaining Message Authentication Code.”, Journal of Computer and System Sciences, July 29, 1999.
[8]Elisa Bertino and Ravi Sandhu, “Database Security — Concepts, Approaches, and Challenges,” IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19, 2005.
[9]Eli Biham, Orr Dunkelman, Nathan Keller, “Enhancing Differential-Linear Cryptanalysis,” ASIACRYPT 2002: pp254–266
[10]R.H. Cooper, William Hyslop, and Wayne Patterson. An Application of the Chinese Remainder Theorem to Multiple-key Encryption in Database Systems. In Proceedings of the Second IFIPinter.Conf. on ComputerSecurity, IEIP/Sec ''84, pages 553-556, 1984.
[11]J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission, September 3, 1999.
[12]George I. Davida, David L. Wells and John B. Kam, “A Database Encryption System with Subkeys,” ACM Transactions on Database Systems, Vol. 6, No.2, 312-328, 1981.
[13]D .E. Denning, “Field Encryption andAuthentication." in D. Chaum(ed), Advances in Cryptology: Proc. CRYPTOLOGY 3, Santa Barbara, CA, pp.231-247, Plenum Press, New York, 1983
[14]John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky and Gideon Yuval, “A Secure Directory Service based on Exclusive Encryption,” Computer Security Applications Conference, Proceedings. 18th Annual 9-13 Dec. 172-182, 2002.
[15]Sergei Evdokimov and Oliver Günther, “Encryption Techniques for Secure Database Outsourcing,” LNCS, 4734, 327-342, 2007.
[16]Sergei Evdokimov, “Secure Outsourcing of IT Services in a Non-Trusted Environment,” Doctor’s Dissertation, 2008, Humboldt-University, Berlin, Germany. Available: http://deposit.d-nb.de/cgi-bin/dokserv?idn=991171357&dok_var=d1&dok_ext=pdf&filename=991171357.pdf
[17]J. Feikis, “Secure Database Management Systems,” IEEE Potentials, 18(1), 17-19, 1999.
[18]H. Hacigümüs, B. Iyer, Chen Li and S. Mehrotra, “Executing SQL over Encrypted Data in the Database Service-Provider Model,” SIGMOD, 216–227, 2002.
[19]Hakan Hacigümüs, Bala Iyer and Sharad Mehrotra, “Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model,” IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA, 61-74.
[20]Hakan Hacigümüs, Bala Iyer and Sharad Mehrotra, “Query Optimization in Encrypted Database Systems,” LNCS, 3453, 43-55, 2005.
[21]J. He and M. Wang, “Cryptography and Relational Database Management Systems,” International Database and Engineering and Application Symposium, 273-284, 2001.
[22]E. Mykletun, M. Narasimha and G. Tsudik, “Authentication and Integrity in Outsourced Databases,” ACM Transactions on Storage, 2(2), 107-138, 2006.
[23]William Stallings, “Cryptography and Network Security: Principles and Practices (4th Edition),” Prentice Hall, 2006.
[24]CSI Computer Crime & Security Survey, 2008. Available: http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf