中文部分
1. 沈中華、李建然(1990),事件研究法,財務與會計實證研究必備,台北:華泰。
2. 沈中華、張大成(2003),「事件研究法與移動」,台大管理論叢,第4卷第1期,頁1-35。
3. 林章德(2000),「上市公司重大投資宣告對股價影響之研究」。東海大學企業管理研究所未出版碩士論文。4. 崔靜青(2003),「電腦審查動態風險評估之研究」,國防管理學院資源管理研究所未出版碩士論文。5. 崔靜青、陳正鎔(2003),群體數位簽章應用於網路檢舉系統之研究,2003電子商務與數位生活研討會,台北:台北大學,2003年四月。
6. 孫屏台、任素壯、陳正鎔 (2000),密碼機制應用於軍警巡察確認系統之研究,2000年「第二屆網際空間:資訊、法律與社會」學術研究暨實務研討會,桃園:中央警官大學,2000 年5 月。
5. 陳正博(2003),「訊息不對稱對股票報酬影響之研究—以台灣股票市場為例」,逢甲大學經濟學系未出版碩士論文。6. 陳國嘉(2000),財務管理,台北:五南。。
7. 陳隆麒(1999),當代財務管理,台北:華泰。
8. 曾育民(2003),數位簽章之類型與應用,資訊安全通訊,Vol. 7, No. 3,2003。9. 曾昱達(2002),「大眾媒體推薦資訊對台灣股票市場之影響」,朝陽科技大學財務金融所未出版碩士論文。10.黃昱之(2003),「國內公司監理之研究」,中原大學企業管理學系未出版碩士論文。11.黃正男(2002),「證卷投資信託業資訊公開揭露之研究」,國立高雄科技第一大學金融營運系未出版碩士論文。12.黃明祥(2001),電子檔案儲存之安全認證研究,朝陽科技大學九十學年度之研究計畫。
13.楊民賢(2004),「查核程序重要性與困難程度之研究—經驗與查核人員認知之關係」,國立台灣大學會計學系研究所未出版碩士論文。14.趙申(2004),「網際網路之資訊仲介研究」,朝陽科技大學資訊管理系未出版碩士論文。15.劉文仲(2002),「銀行早期預警系統-市場與會計資訊之運用」,東吳大學經濟學系碩士在職專班未出版碩士論文。16.劉立恩、羅震國(1999),「落實企業自評『與法令遵循有關』之內部控制何能無窒無礙」,會計研究月刊,第166 期,pp63-68。17.劉思綺(2001),「財務預測對股價影響之研究」,朝陽科技大學財務金融所未出版碩士論文。18.劉潔如(2003),「金融機構之公司治理及其相關監理問題研究—以中興銀行為例」,國立台灣大學國際企業管理學系,未出版之碩士論文。19.蔡篤村(2002),「以內部控制強化公司治理之探討」, 國立台灣大學會計學研究所未出版碩士論文。20.蔡篤翰(2004),「適用於RSA密碼系統之快速模指數運算設計」,國立中正大學電機工程研究所未出版碩士論文。21.鍾雨潼(2003),「台灣2002年公開資訊觀測站重大資訊之資訊內涵分析」,淡江大學管理科學研究所未出版碩士論文。22.嚴文筆(2004),「從內部控制觀點建構舞弊訴訟預警模型」,國立中正大學會計與資訊科技研究所未出版碩士論文。英文部分
1. Akerlof G., “The Market For Lemons:Quality Uncertainty and the Market Mechanism.” Quarterly Journal of Economics. 1970,Vol.84, No.2, 488-500.
2. Baric, N. and Pfitzmann, B. (1997) “Collision-free accumulators and fail-stop signature schemes without trees,” Advances in Cryptology-Eurocrypt ’97, Lecture Notes in Computer Science 1233, pp.480-494.
3. Beaver W. H., Financial Reporting:An Accounting Revolution. Prentice-Hall International Inc,1989.
4. Bresson, E., Stern J., and Szydlo, M., “Threshold Ring Signatures for Ad-Hoc Groups,”
5. Camenisch, J., and Stadler, M., “E-cient group signatures schemes for large groups,” Crypto '97, LNCS 1294, pp. 410-424
6. Chaum, D. and Pedersen, T., “Wallet databases with observers,” Crypto '92, LNCS 740, 89-105.
7. Chaum, D., Heyst, E. V., “Group signatures,” Eurocrypt '92, LNCS 547, 257-265.
8. Chen L, Pedersen TP. “Group signatures: unconditional security for members” ,Ph.D. Thesis, Denmark: Aarhus University, 1995.
9. Chen Sheng-Syan, and Liu Yichen, 2001, "Further evidence on why firms use convertibles: Corporate focus and the sequential-financing hypothesis", Yuan Ze University working paper.
10.Dietrich J. R., Kachelmeier S. J., Kleinmuntz D. N., and Linsmeier T. J., “Market Efficiency, Bounded Rationality, and Supplemental Business Reporting Disclosures.” , Journal of Accounting Research, 2001, Vol.39 No.2, 243-268.
11.Diffie W. and Hellman M., “New Directions in Cryptography,” IEEE Trans. 1976, vol. IT-22, pp. 644-654.
12.ElGamal T., “A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm,” IEEE Trans Information Theory, 1985, vol. IT-31, pp. 469-472.
13.Fama E.F., “ Efficient Capital Markets: II.” , Journal of Finance, 1991, Vol.46, No.5, 1575-1617.
14.Fama E.F., “Efficient Capital Markets: A Review of Theory and Empirical Work.” , Journal of Finance, 1970, Vol.25, No.2, 383-417.
15.Fama E.F., Fisher L., Jensen M.C. and Roll R., “The Adjustment of Stock Price to New Information.” , International Economic Review, 1969, Vol.10, No.1, 1-21.
16.Flippo, E.B. , “Personnel Management(6th ed). ”, New York: McGraw- Hill,1987。
17.Grossman S., “On the Exigency of Competitive Stock Markets where Traders have diverse Information.”, The Journal of Finance, 1976, Vol.31, 573-585.
18.Gordon, D.H. “Evolutionary genetics of the Praomys (Mastomys) natalensis species complex (Rodentia: Muridae).”, Ph.D. thesis, University of the Witwatersrand, Johannesburg, South Africa. 1984.
19.Harn D.A., “Oligosaccharide-specific induction of interleukin 10 production by B220 cells from schistosome-infected mice: a mechanism for regulation of CD4 T-cell subsets.”, 1994, Proc Natl Acad Sci USA 91: 18-22.
20.Hillmer, S.C., and Yu, P.L., “The market speed of adjustment to new information.”, Journal of Financial Economics,1979, Vol.7, 321-345.
21.Krippendorff, K., “Content analysis: An introduction to its methodology.”, Beverly Hills, 1980 ,CA: SAGE Publications.
22.Lee, W. B. and Chang, C. C., “Authenticated Encryption Scheme without Using a One Way Function. ” , Electronics Letters, 1998 ,Vol. 31, No. 19, Sep. 1998, pp. 1656-1657.
23.McCurley K. C. , Naccache D., and Petersen H., “The Discrete Logarithm Problem,” American Mathematical Society, 2002, Vol.42, , pp. 49-74.
24.Myers SC, Majluf NS., “Corporate financing and investment decisions when firm have information that investors do not have”. Journal of Financial Economics, 1984 13: 187-221.
25.Rivest, R., Shamir, A., and Adleman, A., “A method for obtaining digital signatures and public-key cryptosystems.” , Com. of the ACM, Vol. 21(2), 120-126, Feb. 1978.
26.Rivest, R., Shamir, A., and Tauman, Y., “How to leak a secret.” , Asiacrypt '01, LNCS 2248, 552-565.
27.Rivest, R., Shamir, A., Tauman, Y., “How to leak a secret.”,Private Com., Oct. 2001.
28.Schadewitz H.J., Kanto A. J., Kahra H. and Blevins D. R., “An Analysis of the Impact of Varying Levels of Interim Disclosure on Finnish Share Prices within Five Days of the Announcement.” American Business Review, 2002,Vol.20, No.6, 33-46.
29.Shamir, “How to share a secret.”, Communications of the ACM, 1979 22(11):612-613, 1979.
30.Spence. M., “Job Market Signaling.”, Quarterly Journal of Economics, 1974, Vol.87, No.2, 355-375.
31.Tu C.C., , “Multi-objective Optimization of Hard Disk Suspension Assemblies: Part I -- Structure Design and Sensitivity Analysis.” , Computers & Structures, 1996,Vol. 59, No. 4, pp.757-770.