[1]William Stallings,”Cryptgraphy and Network Security Principles And Practice 2nd Edition” Prentice Hall International, Inc.1999
[2]Schneier B. Applied Cryptography, Jogn Wiley and Sons, Inc. 1994, pp.17-41.
[3]William Stallings,“Network And Internetwork Security Principles And Practice”, Prentice Hall International Edition, 1995, pp. 1-14
[4]賴溪松,韓亮,張真誠,”近代密碼學及其應用” 松崗電腦圖書資料股份有限公司, 1998
[5]NBS FIPSPUB 46, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan, 1977
[6]X. Lai and J. Massey, “A proposal for a New Block Encryption Standard,” Advances in Cryptology-EUROCRYPT’90 Proceedings, Berlin: Springer-Verlag, 1991, pp.389-404
[7]R.Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, V.21, n.2, Feb 1978, pp.120-126
[8]T.ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology-CRYPTO’84 Proceedings, Berlin: Springer-Verlag, 1985, pp.10-18.
[9]V. Miller, “Uses of Elliptic Curves in Cryptography”, Advances in Cryptology CRYPTO ''85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417-426.
[10]J. Nechvatal, “Public-Key Cryptography,” In Contemporary Cryptology-The Science of Information Integrity, G.J. Simmons, ed., Piscatoway, N.J.: IEEE Press, 1992, pp.177-288
[11]李南逸,黃宗立, “數位簽章系統之設計與分析,” 國立成功大學資訊工程研究所博士論文, 1996[12]R.Rivest, The MD5 Message Digest Algorithm, RFC 1321, Apr. 1992.
[13]NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Apr. 1995
[14]PKI TWG 96, Federal Public Key Infrastructure (PKI) Technical Specifications (Version 1) Part A: Requirements, Jan. 1996, pp.3-5
[15]CCITT X.500 Series (1992) | ISO/IEC 9594,1--9, Information Technology -- Open Systems Interconnection -- The Directory, 1992.
[16]ITU-T Recommendation X.509 (1997 E): Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, June 1997.
[17]Weidong Kou,”Networking Security And Standards,”KLUWER ACADEMIC PUBLISHERS
[18]VISA, MasterCard, SET Secure Electronic Transaction Specification, Book 1-3, 1997
[19]資策會市場情報中心 王瑞之經理,”網路瞎拼為期不遠-談SET標準,” http://www.ec.org.tw/info/security/setdoc1.htm
[20]Netscape Communication Corp. CA, USA, Secure Sockets Layer, http://developer.netscape.com/docs/manuals/security/sslin/index.htm
[21]Manasse,M. “The MillicentProtocols for Electronic Commerce,”Proc. 1st USENIX workshop on Electronic Commerce, New York, NY, July 11-12, 1995, http://www.research.digital.com/SRC/millicent/
[22]R.L. Rivest and A. Shamir, “PayWord and MicroMint:Two simple micropayment schemes,” May 7, 1996. http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.pdf
[23]J. Stern and S. Vaudenay, "SVP: a Flexible Micropayment Scheme," Advances in Cryptology - Proceedings of Financial Cryptography ''97, pp. 161-171.
[24]Khanh Q. Nguyen, Yi Mu, and Vijay Varadharajan, "Micro-Digital Money for Electronic Commerce," Proc. of the IEEE 13th Annual Computer Security Applications Conference (ACSAC ''97), 1997
[25]Furche, A., and G. Wrightson, “SubScrip-An efficient protocol for pay-per-view payments on the Interner,”Proc. 5th International Conference on Computer Communication and Networks(ICCCN ‘96), Rockville, MD, Oct. 16-19, 1996.
[26]嚴嵩銘, “Recent Researches of Internet Micro-Payment Techniques,” http://www.csie.ncu.edu.tw/~yensm/lcis.html
[27]Chi, Ellis, “Evaluation of Micropayment Schemes,” HP Labs Technical Reports. http://www.hpl.hp.com/techreports/97/HPL-97-14.html
[28]張真誠,林祝興,江季翰, ”電子商務安全”松崗電腦圖書資料股份有限公司
[29]Kalakota, Whinston,”Frontiers of Electronic Commerce”Addison Wesley查修傑,連麗真,陳雪美 譯”電子商務概論”愛迪生維斯理朗文台灣分公司
[30]林俊杰”Visual C++ 6視窗程式設計經典,”碁峰資訊股份有限公司,1999