[1]李重君,論證券拍賣制度,東海大學企業管理研究所碩士論文,民國85年。[2]梁高榮,農產品的電子拍賣,新世紀電子商務技術與實務學術研討會論文集,玄奘人文社會學院資訊處/資訊管理學系,民國89年。
[3]黃博仁,植基於內插多項式之會議金鑰分配系統與多層次資料安全存取控制技術,台灣工業技術學院管理技術研究所資訊管理學程碩士論文,民國84年。[4]樊國楨,電子商務高階安全防護 : 公開金鑰密碼資訊系統安全原理,資策會,民國86年。
[5]盧文慧,競爭式網路拍賣協定之研究,銘傳大學資訊管理研究所碩士論文,民國88年。[6]賴溪松,韓亮,張真誠,近代密碼學及其應用,松崗圖書資料公司,1998年8月。
[7]鍾振華,使用身分基礎之自我驗證的金鑰分配及會議金鑰分配技術,台灣科技大學管理研究所資訊管理學程碩士論文,民國87年。[8]Bierman, H.S., and Fernandez, L., Game Theory with Economic Applications, Addison Wesley, 1993.
[9]Botes, J.J., and Penzhorn, W.T., “Public-key cryptosystems based on elliptic curves,” Proceedings of the 1993 IEEE South African Symposium on Communications and Signal, October 1993, pp.1-5.
[10]Chang, C.C., and Lin, C.H., “How to converse Securely in a conference,” Proceedings of 30th Annual 1996 International Carnahan Conference, 1996, pp.42-45.
[11]Chang, Y.S., Wu, T.C., and Huang, S.C., “ElGamal-like digital signature and multisignature schemes using self-certified public keys,” The Journal of Systems and Software, 2000, pp.99-105.
[12]Chikazawa T., and Yamagishi A., “ An improved identity-based one-way conference key sharing system,” Singapore ICCS/ISITA ''92. ''Communications on the Move'', Vol. 1, 1990, pp.270-273.
[13]Chiou, G.H., and Chen, W.T., “ Secure broadcasting using the secure lock,” IEEE Transactions on Software Engineering, Vol. 15, No. 8, August 1989, pp. 929-934.
[14]Diffie, W., and Hellman, M.E., “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
[15]ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, Vol. IT-31, No. 4, 1985, pp.469-472.
[16]Franklin, M.K., and Reiter, M.K., “The design and implementation of a secure auction service,” Proceedings of IEEE Symposium on Security and Privacy, 1995, pp. 2-14.
[17]Franklin, M.K., and Reiter, M.K., “The design and implementation of a secure auction service,” IEEE Transactions on Software Engineering, Vol. 22, No. 5, May 1996, pp. 302-312.
[18]Girault, M., “Self-certified public keys,” Advances in Cryptology: EUROCRYPT ’91, pp.490-497.
[19]Huhns, M.N., and Vidal, J.M., “Online auctions,” IEEE Internet Computing, Vol. 3, No. 3, May-June 1999, pp.103-105.
[20]Hwang, T., and Chen, J.L., “Identity-based conference key broadcast systems,” IEE Proceedings-Computers and Digital Techniques, Vo.141, No. 1, January 1994, pp.57-60.
[21]Ingemarsson, I., Tang, D.T., and Wong, C.K., “A conference key distribution system,” IEEE Transactions on Information Theory, IT-28, 1982, pp. 714-720.
[22]Jurisic, A., and Menezes, A.J., “Elliptic curves and cryptography,” Dr. Dobb’s Journal, 1997, pp. 26-35.
[23]Knuth, D.E., The art of computer programming, Volume 2, Seminumerical algorithms, Addison-Wesley, 1981.
[24]Koblitz, N., “Constructing elliptic curve cryptosystems in characteristic 2,” Advance in Cryptology: Crypto’90, pp. 156-167.
[25]Koblitz, N., ”Elliptic curve cryptosystems,” Mathematics of Computation, Vol. 48, No. 17, 1987, pp. 203-209.
[26]Koyama, K., and Ohta, K., “Identity-based conference key distribution systems,” Advances in Cryptology: Crypto’ 87, pp. 175-184.
[27]Koyama, K., and Ohta, K., “Security of improve identity-based conference key distribution systems,” Advances in Cryptology: Eurocrypt’88, pp.11-19.
[28]Laih, C.S., and Yen S.M., “On the design of conference key distribution systems for the broadcasting networks,” Proceedings of Twelfth Annual Joint Conference of IEEE Computer and Communication Societies, Vol. 3, 1993, pp. 1406-1413.
[29]Lu, E.H., Hwang, W.Y., and Lee, J.Y., “A conference key distribution system based on the Lagrange interpolating polynomial,” Proceedings of Seventh Annual Joint Conference of IEEE Computer and Communications Societies, 1988, pp. 1092-1094.
[30]Menezes, A.J., and Vanstone, S.A., “Elliptic curves cryptosystems and their implementation,” Journal of Cryptology, Vol. 6, No. 4, 1993, pp. 209-224.
[31]Miller, V.S., “Use of elliptic curves in cryptography,” Advances in Cryptology: Crypto’85, pp.417-426.
[32]Petersen, H., and Horster, P., “Self-certified keys — concepts and applications”, Proceedings of Communications and Multimedia Security''97, 1997, pp.102-116.
[33]Rivest, R., Shamir, A., and Adleman, L.,“ A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
[34]Robinson, D.J.S., A course in linear aigebra with application, World Scientific, New Jersey, 1991.
[35]Saeednia, S., “Identity-based and self-certified key-exchange protocols,” Information Security and Privacy: ACISP ’97, pp. 303-313.
[36]Schnorr, C.P., “Efficient identification and signatures for smart cards,” Advances in Cryptology: Crypto’89, pp.339-351.
[37]Shamir, A., “Identity-based cryptosystems and signature schemes,” Advances in Cryptology: Crypto ’84, pp.47-53.
[38]Sherif, M.H., Serhrouchni, A., Gaid, A.Y., and Farazmandnia, F., “SET and SSL: Electronic payments on the internet,” Proceedings of Third IEEE Symposium on Computer and Communication, 1998, pp.353-358.
[39]Sliverman, J., The arithmetic of elliptic curves, Springer-Verlag, New York, 1986.
[40]Vickrey, W., “Counterspeculation, Auctions, and Competitive Sealed Tenders,” Journal of Finance, Vol. 16, March 1961, pp. 8-37.
[41]Wu, T.C., “Conference key distribution system with use anonymity based on algebraic approach,” IEE Proceedings- Computers and Digital Techniques, Vol. 144, No. 2, March 1997, pp. 145-148.
[42]Wu, T.C., Chang, Y.S., and Lin, T.Y., “Improvement of Saeednia''s self-certified key exchange protocols” Electronics Letters, Vol. 34, No. 11, 28 May 1998, pp. 1094-1095.
[43]Yang, H.K., Choi, J.H., and Ann, Y.H., “Self-certified identity information using the minimum knowledge,” IEEE TENCON., 1996, Vol. 2, pp. 641-647.
[44]http://www2.bid.com.tw/safe1.asp~safe3.asp
[45]http://www.p2p.com.tw/security.html
[46]http://www1.coolbid.com/verisign.html
[47]http://www.hitrust.com.tw/128位元新聞稿.doc
[48]http://www.ebay.com
[49]http://www.onlineauthentics.com/oa/default.asp?sid=1