1.力世投顧,一同打造你我的虛擬世界-線上遊戲,http://tw.pwcm.com.tw/reports.htm。
2.卡威科技,IC智慧卡(Smart Card)與電子商務,http://www.cardweb.com.tw/card/card/ic_EC.htm。
3.林祝興、張真誠,電子商務安全技術與應用,旗標,初版,2004年。
4.邵曉薇、王維民,電子商務線上交易系統,旗標,初版,2000年。
5.張真誠、林祝興、江季翰,電子商務安全,松崗,初版,2002年。
6.張蜀永,從遊戲到On-line-線上遊戲的發展介紹,http://mail.nhu.edu.tw/~society/e-j/33/33-30.htm。
7.陳學彥,資訊安全理論與實務,文魁,初版,2000年。
8.創市際市場研究顧問,創市際《2004網路生活大調查:看誰愛玩Online Game?-線上遊戲玩家生活型態剖析》,http://www.insightxplorer.com/lifestyle/index.html。
9.彭漣漪、林士蕙,美、韓逐鹿線上遊戲,台灣如何觀摩「練功」,e天下雜誌,10月,2002年。10.數位內容產業推動服務網,遊戲軟體的類型,http://www.nmipo.org.tw/files/top_3/2/3/Ch3-1.pdf。
11.鄭育鎔,網路多人互動遊戲介紹,http://www.iii.org.tw/special/article/game.htm
12.薛仲男,虛擬世界創造真實獲利-線上遊戲產業,http://lottery.hncb.com.tw/monthly/mon017/01706.pdf。
13.Luis von Ahn, Manuel Blum, John Langford,Telling humans and computers apart automatically,Communications of the Association for Computing Machinery, Vol.47, 57-60
14.Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford,CAPTCHA: Using Hard AI Problems for Security,EUROCRYPT,2002
15.T. Aura, P. Nikander, and J. Leiwo,DoS-resistant Authentication with Client Puzzles,Cambridge Security Protocols Workshop 2000, Vol. 2133, 170-177,2001
16.Nathaniel E. Baughman, Brian Neil Levine,Cheat-Proof Playout for Centralized and Distributed Online Games,IEEE InfoCom, pages 104 – 113,2001
17.L. Ding, C.S. Lai, and Y.M. Huang,Password-only Authenticated Key Establishment Protocol Without Public Key Cryptography,IEE Electronic Letters, Vol.41, No.4,2005
18.Simson Garfinkel, Gene Spafford,Web Security & Commerce,O’REILLY,2000
19.Kenji Imamoto, Kouichi Sakurai,A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model,18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 1 p. 327,2004。
20.Junbaek Ki, Jung Hee Cheon, Jeong-Uk Kang, Dogyun Kim,Taxonomy of online game security,Electronic Library, Vol. 22, No.1, 65-73,2004。
21.Sung-Woon Lee; Hyun-Sung Kim; Kee-Young Yoo,Improved Efficient Remote User Authentication Scheme using Smart Cards,IEEE Consumer Electronics, Vol.50, No.2, pp.565-567,2004。
22.Merritt Maxin, David Pollino,Wireless Security,McGraw-Hill,2002
23.Lincoln D. Stein,Web security – A step-by-step reference guide,Addison Wesley,2000
24.Justin Weisz, Srini Seshan,Detecting Cheaters in a Distributed Multiplayer Game Environment,SCS Undergraduate Thesis Topics,2003
25.Jeff Yan,Security Design in Online Games,19th Annual Computer Security Applications Conference,2003
26.Jeff Yan et al,Security Issues in Online Games,Electronic Library, Vol. 20, No.2,2002
27.W. H. Yang, S. P. Shieh,Password authentication schemes with smart cards,Computers & Security, Vol. 18, No. 8, pp. 727-733,1999。
28.Her-Tyan Yeh, H.M. Sun, T. Hwang,Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks,International Journal of Information and System Engineering,2003。
29.Xiao-Yun Wang, Hong-Bo Yu,Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD,http://eprint.iacr.org/2004/199.pdf,2004