[1] 鄭玉玲,賴昌祈,廖啟業,張光耀,張耿豪,謝東明,梁若玲, “高安全性硬體密碼加速器研發與應用,” 影像與識別, Volume 5, No. 4, pp. 65-73, 民88.12. Available:www.cis.nctu.edu.tw/~ippr/Doc/Dec88/6.doc
[2] 吳榮軒, 基於CAGI 方案之車用電子裝置防盜機制, 國立成功大學工程科學所碩士論文, 2008.[3] J. P. Anderson, “Computer Security Technology Planning Study,” Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972.
[4] Eun-Ae Cho, Chang-Joo Moon and Doo-Kwon Baik, “Home Gateway Operating Model using Reference Monitor for Enhanced User Comfort and Privacy,” IEEE Transactions on Consumer Electronics, Volume 54, Issue 2, pp. 494 – 500, May. 2008.
[5] Joan Daemen and Vincent Rijmen, “AES Proposal: Rijndael,” 1999, http://csrc.nist.gov/encryption/ aes/rijndael/Rijndael.pdf.
[6] Ulfar Erlingsson, “The Inlined Reference Monitor Approach to Security Policy Enforcement,” ProQuest Information and Learning, UMI, Cornell University, Ithaca, NY, USA, Jan, 2004.
[7] David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, “Proposed NIST Standard for Role-Based Access Control,” ACM Transactions on Information and System Security, Volume 4, No. 3, pp. 224-274, August 2001.
[8] Satish Gupta, “White Paper: Home Gateway,” Wipro Technologies, http://www.broadcastpapers.com/whitepapers/wiprohomegateway.pdf
[9] Men Long and Uri Blumenthal, “Manageable One-Time Password for Consumer Applications,” International Conference on Consumer Electronics, Las Vegas, USA, pp. 1-2, 10-14 Jan. 2007.
[10] Young Gu Lee, Hyun Chul Kim, Jung Jae Kim and Moon Seog Jun, “A Design of Home Network Security Protocol Using User Authentication and Access Control Technology,” International Conference on Convergence and Hybrid Information Technology, pp. 30 - 34, 28-30 Aug. 2008.
[11] Yun-Kyung Lee, Deok Gyu Lee, Jong-Wook Han and Tai-Hoon Kim, “Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile,” The Computer Journal Advance Access published, Volume 51, Issue 4, July 24, 2008.
[12] A. Pfitzmann, B. Pfitzmann, M. Schunter and M. Waidner, “Trusting Mobile User Devices and Security Modules,” IEEE Computer, Volume 30, pp. 61–68, Feb. 1997.
[13] R. Rivest, “The MD5 Message-Digest Algorithm,” MIT Laboratory for Computer Science and RSA Data Security, Inc. Apr. 1992.
[14] J. Suomalainen, S. Moloney, J. Koivisto and K. Keinanen, “OpenHouse: A Secure Platform for Distributed Home Services,” Sixth Annual Conference on Privacy, Security and Trust, pp. 15 – 23, 1-3 Oct. 2008.
[15] UPnP Forum, UPnP Technology, http://www.upnp.org/.
[16] A. Weimerskirch, C. Paar, and M. Wolf, “Cryptographic Component Identification: Enabler for Secure Vehicles,” in Proc. IEEE 62nd Semiannual Vehicular Technology Conference (VTC), Dallas, Texas, USA, pp. 1227–1231, Sept. 2005.
[17] William C.Barker, “Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, May. 2004.
[18] Jung-Hsuan Wu, Chien-Chuan Kung, Jhan-Hao Rao, Pang-Chieh Wang, Cheng-Liang Lin and Ting-Wei Hou, “Design of an In-vehicle Anti-theft Component,” Eighth International Conference on Intelligent Systems Design and Applications(ISDA), Kaohsiung City, Taiwan, Volume 1, pp. 566 -569, Nov. 2008.
[19] Pang-Chieh Wang, Cheng-Liang Lin, Chieh-Chuan Kung, Jhan-Hao Rao and Ting-Wei Hou, “A "Try Before You Buy" Approach for Networked Digital Home Appliances and Services,” International Conference on Consumer Electronics, Las Vegas, USA, pp. 1-2, 10-14 Jan. 2009.
[20] P. C. Wang, T. W. Hou, J. H. Wu, and B. C. Chen, "A Security Module for Car Appliances," International Journal of Mechanical Systems Science and Engineering(IJMSSE), pp. 155–160 , Volume. 1, No. 3, Summer 2007.
[21] E. J. Yoon and K. Y. Yoo(2006), “One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity,” Workshop on Security Issues on Grid/ Distributed Computing Systems (SIGDCS 2006), pp. 303-311, May. 2006.