[1] William Stallings , “Network And Internetwork Security Principles And Practice” , Prentice Hall International Edition , pp.1-14 , 1995
[2] M.E. Hellman and W. Diffie , “New Directions in Cryptography”, IEEE Transaction on Information Theory, Vol. IT-22, No.6, pp.644-654, Nov. 1976
[3] Adleman L. , Rivest R. L. and Shamir A. ”A method for Obtaining Digital Signature and Public-key Cryptosystem”, Communication of ACM, vol 21, pp.120-126, 1978.
[4] ElGamal T. , ”A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. on Info. Theory, vol.31, pp.469-472, 1985.
[5] NBS FIPS PUB 46, ”Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977
[6] J. Massey and X. Lai, ”A Proposal for a New Block Encryption Standard”, in Proceeding of EUROCRYPT’90, Springer-Verlag, Berlin, pp.389-404, 1991.
[7] NIST FIPS PUB 180-1, ”Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr.1995.
[8] R. Rivest , ”The MD5 Message Digest Algorithm”, RFC 1321, Apr.1992.
[9] ITU-T Recommendation X.509 (1997 E): Information Technology – Open Systems Interconnection – The Directory: Authentication Framework, June. 1997
[10] C.E. Perkins, “Ad Hoc Networking Addison Wesley Professional”, Dec. 2000.
[11] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. IEEE Workshop Mobile Computing Systems and Applications, Dec. 1994.
[12] J.D. Turnow and J. Jubin, “The DARPA Packet Radio Project”, Proc. IEEE, 1987.
[13] Jean-Pierre Hubaux , Levente Buttyan and Srdjan Capken , “Self-Organized
Public-key Management for Mobile Ad Hoc Networks”, IEEE Transactions on mobile computing
[14] Himanshu Khurana and Virgil D. Gligor, “Enforcing Dependencies between PKI Certificates in ad-hoc Networks”, IEEE International Conference on Telecommunications, Bucharest, Romania, June, 2001.
[15] B. Schneier , “A Primer on Authentication and Digital Signatures”, Computer Security Journal ,v.10 ,n.2 , pp.38-40, 1994.
[16] C.J. Mitchell, F. Piper and P. Wild, “Digital Signatures”, Contemporary Cryptology: The science of Information Integrity, IEEE Press, pp.325-378, 1991.
[17] David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Dec. 1994.
[18] Joon S. Park and Ravi Sandhu. “Binding Identities and Attributes Using Digitally Signed Certificates”, 16th Annual Computer Security Applications Conference (ACSAC) , New Orleans , Louisiana , December 11-15 , 2000
[19] 王瑞堂,黃宗立 “安全電子公文之設計”,國立成功大學資訊工程研究所碩士論文,2000[20] D. Shands , R. Yee and J. Jacobs. “Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies”, Proceedings of the Network and Distributed Systems Security Symposium, San Diego, pp.187, Feb. 2000.
[21] T. Gibson. “An Architecture for Flexible”, High Assurance , Multi-Security Domain Networks. To appear in Proceedings of the Network and Distributed Systems Security Symposium, San Diego, Feb. 2001.
[22] L. Zhou and Z. J. Hass. “Securing Ad Hoc Networks” IEEE Networks, 1999
[23] M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, Proc. ACM Workshop Wireless Security, Sept. 2002.
[24] J. Douceur, “The Sybil Attack”, Proc. First Int’l Workshop Peer-to-Peer Systems(IPTPS), 2002.