[1] 全球華文網路中心,蘇東坡畫扇子電子書全文, http://edu.ocac.gov.tw/ocac_ebook/show-chap.asp?chap=100039-002-0013。
[2] 亞富國際有限公司創意授權模式,http://www.ifbag.com.tw/p2a-5.asp。
[3] 林佑徽、林育妃,“行銷藝術 出賣創意-藝奇藝術授權公司e把抓”, 經濟部商業現代化雙月刊。
[4] 林育如,“當藝術遇上授權”, 藝奇藝術授權文化股份有限公司, Licensed by Artkey. www.artkey.com. 1. 2007/4/20。
[5] 荷蘭銀行梵谷卡廣告和市場分析。http://blog.yam.com/garyli/article/5580015。
[6] 郭羿承,“孫悟空還只是一隻猴子:國際藝術授權產業簡介”。http://www.digitalcontent.org.tw/e/files/93/930901/monkey.pdf。
[7] 郭宣靆,“核心版權與artkey藝術授權中心之SWOT分析”,南華大學出版所http://www.nhu.edu.tw/~society/e-j/31/31-14.htm#_ftn11。
[8] 梁婷育,“藝術授權造就200億美元市場”,專題報導, http://artnews.artlib.net.tw/145/191/cover.html,2009/9/1。
[9] 黃育蓮,“繪本製作之授權與經濟之研究”世新大學傳播管理學系碩士論文,2005。[10] 謝顒丞,“典藏藝術與數位化工程--數位化技術指南”, 民國97年07月,ISBN/IBBN 978986014992。
[11] 藝術授權手冊規劃計畫期末總結報告書,國際技術授權主管總會中華分會, 國家文化藝術基金會,2007。
[12] artkey藝術授權中心,http://www.artkey.com/taiwanart/index/index.asp。
[13] B. Preneel, “The state of cryptographic hash functions,” in Lectures on Data Security: Modern Cryptology in Theory and Practice, LNCS 1561. Berlin: Springer, pp. 158-192, 1999
[14] C.P. Schnorr, Efficient identification and signatures for smart cards, in G. Brassard, ed. Advances in Cryptology—Crypto ''89, 239-252, Springer-Verlag, 1990. Lecture Notes in Computer Science, nr 435
[15] D. Chaum, “Blind Signatures for Untraceable Payments,”Advances in Cryptology – CRYPTO’82, pp. 199-203, 1982.
[16] H. B. Chen, W. B. Lee, K. J. Ho and C. K. Yeh, “A Secure and Cost-Effective Content Protection Scheme for DRM Systems,” Journal of Computational Information Systems Vol. 6, No. 5, pp. 1377-1386, 2010. Available at http://www.Jofcis.com
[17] H.Y. Lin and L. Harn, “Authentication protocols with non-repudiation services in personnel communication systems," IEEE Communication. Letter, Vol. 3, no. 8, pp. 236-238, Aug. 1999.
[18] J. L. Camenish, J. M. Priveteau and M. A. Stadler, “Blind Signature Based on the Discrete Logarithm Problem,”Advances in Cryptology – EUROCRYPT’94, LNCS 950, pp. 428-432, 1994.
[19] K. Shum and V. K. Wei, “A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection,” Proceeding of the 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprise, pp. 55-56, 2002.
[20] L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
[21] M. Mambo, K. Usuda and E. Okamoto: "Delegation of the power to sign messages" ,IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353, Sep. 1996.
[22] NIST, “The Digital Signature Standard Proposed by NIST,” Communications of the ACM, Vol. 35, No. 7, pp. 36-40, 1992.
[23] R. Rivest, A. Shamir and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[24] S. Kim, S. Park and D. Won, “Proxy Signatures, Revised, ”Proceeding of the International Conference in Information and Communications Security – ICICS’97, Vol. 1334, pp. 223-232, 1997.
[25] S. Lal and A.K. Awasthi, “Proxy Blind Signature Scheme, ”Transactions on Cryptology, Vol.2, No. 1, pp.5-11, 2005.
[26] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, Advances in Cryptology-CRYPTO''84, Springer-Verlag, LNCS 196, 1985, pp.10-18.
[27] T. F. Lee, S. H. Chang, T. L. Hwang and S. K. Chong, “Enhanced delegation-based authentication protocol for PCSs,” IEEE Trans. Wireless Communications, vol. 8, no. 5, pp.2166-2171, May 2009.
[28] W. B. Lee and C. K. Yeh, “A New Delegation-Based Authentication Protocol For Use in Portable Communication Systems,” IEEE Transactions on Wireless Communications, Vol. 4, Issue 1, pp. 57-64, Jan. 2005.
[29] Z. Tan, Z, Liu and C. Tang, “Digital Proxy Blind Signature Schemes Based on DLP and ECDLP,”MM Research Preprints, MMRC, AMSS, Academia Sinica, No. 21, pp. 212-217, 2002.