References
〔1〕 Graham ,G.S. and Denning ,D. J.(1972): “ Protection-Principles and
Practice”, Proc. AFIPS 1972 SJCC,Vol.40,pp. 417-429.
〔2〕 Wu,M.L. and Hwang,T.Y.(1984): “Access Control with Single-Key-
Lock” ,IEEE Transactions on Software Engineering.Vol.SE-
10,No.2,1984,pp.185-191.
〔3〕 Jan,J.K.(1987): “A Single Key Access Control Scheme in Information
Protection Systems”. Proceedings of National Computer Symposium
1987,pp.299-303;also to appear in Information Sciences,1989.
〔4〕 Jan,J.K. Chang,C.C. and Wu,L.H(1989): “An Arithmetic Coding Oriented
Single Key Access Control Scheme”, to appear in The International
Journal of Policy and Information. Vol.13 ,No.2, December 1989.
〔5〕 Chang,C.C.(1986): “On the Design of a Key-Lock-pair Mechanism in
Information Protection System”, BIT, Vol.26, 1986, pp410-417.
〔6〕 Chang,C.C. and Chen,C.P.(1986): “A Key-Lock-pair Mechanism Based on
Generalized Chinese Remainder Theorem ”,Journal of the Chinese Institute
of Engineers,Vol.9,No.4,1986,pp.383-390.
〔7〕 Chang,K.C and Jang.T.M.(1987): “ An Access Control Mechanism for
Information Security”, Proceedings of Academic Seminar Public Security
and Information Management, Taipei, Taiwan, April 1987,pp.387-396.
〔8〕 Chang,C.C.(1987): “An Information Protection Scheme Based upon Number
Theory”, The Computer journal , Vol.30 , No.3, 1987. pp.249-253.
〔9〕 Chang,C.C. and Chang,C.H.(1987): “A Dynamic Access Control Scheme Based
upon Chinese Remainder Theorem”, Proceedings of National Computer
Symposium 1987,pp.304-311.
〔10〕Chang,C.C. and Jan,J.K.(1988): “An Access Control Scheme for New Users
and Files”, The International Journal of Policy and Information,Vol.
12,No. 2,December 1988,pp.89-98.
〔11〕Akl, S. G. and Taylor, P. D. (1983): “Cryptographic Solution to a
problem of Access Control in a Hierarchy”, ACM Trans. Computer System,
Vol.1, No 3, August 1983, pp.239-247.
〔12〕Mackinnon, S. T., Taylor, P. D., Meier, H., and Akl, S. G. (1985): “An
Optimal Algorithm for Assignment Cryptographic Keys to Control Access in
a Hierarchy”, IEEE Transactions on Computers, Vol. C-34, No.9, September
1985,pp.95-98.
〔13〕Chang, C. C. (1987): “On the implementation of User Hierarchy Structure
in Information Systems”, Proceedings if International Conference on
Computer Software and Applications, IEEE, Tokyo, Japan, October 1987,
pp.412-415.
〔14〕Sandhu, R. S. (1988): “Cryptographic Implementation of a Tree Hierarchy
for Access Control”, Information Processing Letters, Vol.27, 1988, pp.95-
98.
〔15〕J. J. Hwang, B.M. Shao and P.C. Wang, “A new access control method using
prime factorization”, The Computer Journal,Vol.35,No.1,pp.16-20,1992.
〔16〕W. Diffie and M.E. Hellman , ”New Directions in Cryptography ”,IEEE
Trans. Inform. Theory ,Vol. IT-22,1976.
〔17〕Eiji OKAMOTO, Member, IEEE, and KAZUE TANAKA,” Identity-Based
Information Security Management System for Personal Computer
Networks ”,IEEE Journal on selected areas in Communications, Vol.
7,No.2,February 1989.
〔18〕Kun Liu, Jan H. Bons and Jens C. Arnbak ,”Compound Document Transfer
Between Electronic-Mail Network And Facsimile Terminals”, IEEE Region 10
Conference Computer and Communication System ,September 1990.Hong Kong.
〔19〕C.-C. Chang , T.-C. Wu “Remote password authentication with smart
cards”, IEEE Proceedings-e ,Vol.138,No.3,May 1991.
〔20〕J,-P. Thomasson ,L. Baldi ,”Smartcards : Portable Security”,
Proceedings of the IEEE SET,1997.
〔21〕MARVIN A. SIRBU, “Credits and debits on the Internet”, Proceedings of
the IEEE Electronic Payments, pp.23-29, 1997.
〔22〕C. Crepeau and J. Killan, “ Achieving Oblivious Transfer Using Weakened
security Assumptions”, 29 th FOCS,1998.
〔23〕Jorgen Brandt, Ivan Damgard , Peter Landrock , Torben Pedersen ,”Zero-
Knowledge Authentication Scheme with Secret Key Exchange”, J .of
Crypto., vol.1,1998.
〔24〕Shiyong Lu,Scott A. Smolka, “Model Checking the Secure Electronic
Transaction (SET) Protocol”, Proceedings of the IEEE SET,2000.
〔25〕楊吳泉,賴溪松,”PGP 之弱金鑰”,資訊安全通訊,第四卷第一期,December 1997.〔26〕賴溪松編著, “資訊安全通訊”, 中華民國資訊安全學會, Vol.7, No.3, June
2001.
〔27〕K.H.Rosen, Elementary Number Theory and It’s Applications,3 rd ed.,
Addision Wesley,1992.
〔28〕M.R.Schreeder, Number Theory in Science and Communication, 2nd ed.,
Springer-Verlag,1986.
〔29〕J. k. Strayer , Elementary Number Theory, PWS Publishing
Company,Boston,1994.
〔30〕Douglas R. Stinson, CRYPTOCRAPHY Theory an Practice, CRC.
〔31〕Simon Hayhin, COMMUNICATION SYSTEMS , 4 th Edition, Wiley Computer
Publishing ,JOHN WILEY&SONS,INC.
〔32〕William Stallings, Cryptography and Network Security, Principles and
Practice, Third Edition, pp.28-30, 2003.
〔33〕William Stallings, Cryptography and Network Security, Principles and
Practice, Third Edition, pp.616-634, 2003.
〔34〕Mark S, Merkow , Jim Breithaupt , Ken L. Wheeler, Building SET
Applications for Secure Transactions. Wiley Computer Publishing. JOHN
WILEY&SONS,INC.
〔35〕Vijay Ahuja , PH.D. Secure Commerce on the Internet, AP Professional INC.
〔36〕Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons,
Inc, pp.429-459, 1996.
〔37〕Chris Brenton 原著,Mastering Network Security,儒林圖書公司.
〔38〕閔嗣鶴,嚴士健編著,初等數論,第二版,凡異初版社,1957.
〔39〕楊吳泉編著, 現代密碼學入門與程式設計, 全華科技圖書股份有限公司, 1997.
〔40〕張真誠編著,電腦密碼學與資訊安全, 松崗電腦圖書資料股份有限公司, 1999.
〔41〕賴溪松, 韓亮, 張真誠編著, 近代密碼學及其應用, 松崗電腦圖書資料股份有限公
司, 1999.
〔42〕伍麗樵.陳世仁編著, 網路安全與管理, 全華科技圖書股份有限公司, 1997.
〔43〕文書流程管理手冊,行政院研究發展考核委員會.教育部中部辦公室編印.20001.
〔44〕賴世培.項靖.宋餘俠.曾章瑞.馮震宇.吳秀光.詹中原合著,數位化政府,國立空中大
學.2002.
〔45〕張真誠, 林祝興, 江季翰編著,電子商務安全, 松崗電腦圖書資料股份有限公司,
2000.
〔46〕張耀仁.劉永信編著, 電子商務系統, 高立圖書資有限公司, 2001.
〔47〕張曉琪,廖建勇原著,劉緯鎧,阮明燦編譯,電子商務理論與實踐, 全華科技圖書股份有
限公司, 2001.
〔48〕吳汝貞編著,電子商務基礎技術及實務,新文京開發出版有限公司,2001.
〔49〕王貳瑞編著,電子商務概論,華泰文化事業有限公司,2000.
〔50〕許招墉編譯 , COMMUNICATION通訊 尖端通訊新知, 全華科技圖書股份有限公司.
〔51〕張大中編著,數據與數位通訊系統原理, 全華科技圖書股份有限公司.
〔52〕藍國桐編著, 通訊原理與應用 , 全華科技圖書股份有限公司.
〔53〕何中庸編譯 ,數位形動通信入門 , 全華科技圖書股份有限公司.