參考文獻
[1] 資策會-Focus on Interment News & Data,莊順斌 (2004),寄望小額付款行動商務市場將可大幅成長
http://www.find.org.tw/0105/news/0105_news_disp.asp?news_id=3413
[2] 中華業餘無線研究會,梁偉雄 (2004),淺談SIM卡
http://www.vr2rc.org/cm.html
[3] 經濟部-我國PKI互通管理及推動計畫,工業技術研究院 (2003),台灣電信產業應用PKI之調查報告
http://61.62.31.208/2004/main7a.htm
[4] 經濟部-網路商業應用資源中心,吳曉菁 (2003),B2C付款之交易履約保障機制藍新科技ezPay個人帳房
http://www.ec.org.tw/
[5] 楊舜仁 PKM 資訊網,楊舜仁 (2003),行動商務的發展趨勢與個人應用(上)
http:// www.asia-learning.com/sooner/article/259089753
[6] CNT台灣國際電子商務中心,EC研究報告 (2002),解析PayPal的成功模式
http://www.nii.org.tw/cnt/info/Report/20020102.htm
[7] CNT台灣國際電子商務中心,EC研究報告 (2002),2002年芬蘭行動通訊研討會暨商展 出國報告書
http:// www.nii.org.tw/cnt/info/Report/20020602_3.4.htm
[8] 台灣科技資訊網, Larry Loh (2001), 行動商務時代來臨
http://taiwan.cnet.com/enterprise/technology/0,20062852,20014683,00.htm
[9] 工研院資經中心,葉恆芬 (2001),i-Mode有助DoCoMo ARPU抗跌
http://www.itri.org.tw/chi/index.jsp
[10] ezPay個人帳房-交易履約保障
https://www.ezpay.com.tw/ezPay_C2C/welcome/escrow/about.jsp
[11] In-Stat-Reasearch Information, David Chamberlain, Mobile Advertising, Brands and Affinity Marketing
http://www.in-stat.com/Abstract.asp?ID=231&SKU=IN0502096MCM
[12] GSM World-GSM Technology, GSM-The Wireless Evolution, Today’s GSM Platform.
http://www.gsmworld.com/technology/gsm.shtml
[13] Pyramid Research, Global Mobile Subscribers to top out over 2.6bn by YE2006
http://www.pyramidresearch.com/mbl_may17_mobsub.htm?SC=PD05b
[14] EPSO Final Conference Presentations, Creating a Mobile Payment Standard based on a Co-Operation between Financial Institutions and Telcos, A. Sanz, pp. 1-20.
http://epso.jrc.es/conference/presentations.html/sanz.ppt
[15] EPSO Final Conference Presentations, M-Payments-Taking a Vision to Cross Border Reality, P. Seipp, CMO, Paybox.net AG., pp. 1-16. http://epso.jrc.es/conference/presentations.html/seipp.ppt
[16] ETSI-Telecom Standards, http://www.etsi.org
[17] PayPal, http://www.paypal.com
[18] 賴溪松、韓亮、張真誠 (2003),近代密碼學及其應用,旗標出版股份有限公司。
[19] 陳星百 (2003),「行動票券交易之研究」,碩士論文,朝陽科技大學資訊管理系研究所,台中。[20] 薛夙珍、吳志濠 (2005),「多商家之小額分割串列交易協定」,第十六屆國際資訊管理學術研討會,台北,台灣。
[21] N. Asokan, P. A. Janson, M. Steiner, and M. Waidner (1997), “The State of the Art in Electronic Payment Systems,” IEEE Computer, pp. 28-35.
[22] C. C. Chang, J. S. Lee and Y. F. Chang (2005), “Efficient Authentication Protocol of GSM,” Computer Communications, Vol. 28, Isu. 8, pp. 921-928.
[23] Y. J. Chen, C. C. Chang and W. P. Yang (1995), “Parallel Computation of the Modular Cascade Exponentiation,” Journal of Parallel Algorithms and Applications, Vol. 7, pp. 29-42.
[24] L. Camp, M. Sirbu and J. D. Tygar (1995), “Token and Notational Money in Electronic Commerce,” Proceedings of the 1th Usenix Workshop on Electronic Commerce, pp. 1-12.
[25] D. Chaum, A. Fiat and M. Naor (1990), “Untraceable Electronic Cash,” Proceedings on Advances in Cryptology, Lecture Notes in Computer Science, Santa Barbara, California, USA, Vol. 403, pp. 319-327.
[26] W. Diffie and M. E. Hellman (1976), ”New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654.
[27] N. E. Fishway, M. Nofal and A. Trdros (2002), “An Effective Approach for Authentication of Mobile Users,” Proceedings of the 55th Vehicular Technology Conference, Vol. 2, pp. 598-601.
[28] L. Ferreirra and R. Dabad (1998), “A Scheme for Analyzing Electronic Payment Systems,” Proceedings of the 14th Annual Computer Security Applications Conference, pp. 137-146.
[29] L. Harn and W. J. Hsin (2003), “On the Security of Wireless Network Access with Enhancements,” Proceedings of the ACM Workshop on Wireless Security, San Diego, California, USA, pp. 89-95.
[30] G. Horn and K. M. Martin and C. J. Mitchell (2002), “Authentication Protcols for Moile Network Environment Value-Added Services,” IEEE Transactions on Vehicular Technology, Vol. 51, Isu. 2, pp. 383-392.
[31] G. Horn and B. Prneel (2000), “Authentication and Payment in Future Mobile Systems,” Journal of Computert Security, Vol. 8, Isu. 2/3, pp. 183-207.
[32] M. S. Hwang, Y. L. Tang and C. C. Lee (2000), “An Efficient Authentication Protocol for GSM Networks,” Proceedings of AFCEA/IEEE EuroComm, Munich, Germany, pp. 326-329.
[33] R. Hauser, M. Steiner and M. Waidner (1996), Micro-Payments based on iKP, IBM Research Report 2791 (# 89269).
[34] N. Kyeyer, K. Pousttchi and K. Turowski (2002), “Characteristics of Mobile Payment Procedures,” Proceedings of the 3th International Symposium on Methodologies for Intelligent Systems, Lyon, France, pp. 10-22.
[35] S. Kim and W. Lee (2003), “A PayWord-based Micropayment Protocol Supporting Multiple Pyaments,” Proceedings of the 12th International Conference on Computer Communications and Networks, pp. 609-612.
[36] E. Kountz (2002), Mobile Commence:Financial Institutions and Mobile Carriers Define Their Roles in the New M-World, TowerGroup.
[37] S. Kim and H. Oh (2001), “An Atomic Micropayment System for a Mobile Computing Enivronment,” IEICE Transactions on Information and Systems, Vol. E82-D, No. 6, pp. 709-716.
[38] C. C. Lee, M. S. Hwang and W. P. Yang (2003), “Extension of Authentication Protocol for GSM,” Proceedings of the IEEE Communications, Vol. 150, No. 2, pp. 91-95.
[39] E. P. Lim, K. Siau (2003), Advances in Mobile Commerce Technologies, Hershey, USA, PA: Idea Group Publishing, ISBN: 159140052X.
[40] M. Lee and K. Kim (2002), “A Micro-Payment System for Multiple-Shopping,” Proceedings of the Symposium on Cryptography and Information Security, Shirahama, Japan, Vol. 1/2, pp. 229-234.
[41] R. Marc, R. Sandro and M. Laurent (2001), From SET to PSET-The Pseudonymous Secure Electronic Transaction Protocol, Technical Report Tik-Nr. 117.
[42] J. K. Mackie-Masnon and K. White (1996), “Evaluating and Selecting Digital Payment Mechanisms,” Proceedings of the Telecommunications Policy Research Conference, Solomon''s Island, Maryland, USA.
[43] A. J. Menezes, P. C. Van Oorschot and S. A. Vanstone (1997), Handbook of Applied Cryptography, Boca Raton, FL: CRC Press.
[44] D. O’ Mohony, M. Peirce and H. Tewari (1997), Electronic Payment Systems, Artech House.
[45] B. C. Neuman (1995), “Security, Payment, and Privacy for Network Commerce,” IEEE Journal on Selected Areas in Communications, Vol. 13, No. 8, pp. 1523-1531.
[46] K. Q. Nguyen, Y. Mu and V. Varadharajan (1997), “Micro-Digital Money for Electronic Commerce,” Proceedings of the 13th Annual Computer Security Applications Conference, pp.2-8.
[47] A. Peinado (2004), “Privacy and Authentication Protocol Providing Anonymous Channels in GSM,” Computer Communications, Vol. 27, Isu. 17, pp. 1709-1715.
[48] K. Pousttchi (2003), “Conditions for Acceptance and Usage of Mobile Payment Procedures,” Proceedings of the 2th International Conference on Mobile Business, Vienna, pp. 201-210.
[49] R. L. Rivest and A. Shamir (1996), PayWord and MicroMint: Two Simple Micropayment Schemes, MIT Laboratory for Computer Science.
[50] H. Schauer and R. Riedl (2001), M-Commerce, Institute Fur Informatik, Universitat Zurich.
[51] G. S. Schwiderski and K. Heiko (2002), “Secure Mobile Commerce,” Electronic & Communication Engineering Journal, Vol. 14, No. 5, pp. 228-238.
[52] B. Skiba, M. Johnson, M. Dillon and C. Harrison (2000), Moving in Mobile Media Mode, Lehman Brothers, Editor.
[53] W. Stallings (1999), Cryptography and Network Security: Principles and Practice, Prentice Hall International, INC., Second Edition, USA.
[54] J. D. Tygar (1996), “Atomicity in Electronic Commerce,” Proceedings of the 15th ACM Symposium on Priciple of Distributed Computing, Philadelphia, pp. 8-26.
[55] R. Vaidynathan (2002), “Wireless and Mobility Enterprise Application Deployments,” eAI Journal, pp. 26-28.
[56] U. Varshney and R. Vetter (2002), “Mobile Commerce:Framework, Applications and Networking Support,” ACM/Kluwer Journal on Mobile Networks and Applications, Vol. 7, No. 3, pp. 185-198.
[57] F. M. Veerse (1999), Mobile Commerce Report, Durlacher Research Ltd., London, pp. 1-79.
[58] M. S. Wang, I C. Lin and L. H. Li (2001), “A Simple Micro-Payment Scheme,” Journal of Systems and Software, Vol. 55, No. 3, pp. 221-229.
[59] C. Xenakis and L. Merakos (2004), “Secure in Third Generation Mobile Networks,” Computer Commenication, Vol. 27, Isu. 7, pp. 638-650.
[60] S. M. Yen (2004), “PayFair:a Prepaid Internet Micropayment Scheme Ensuring Customer Fairness,” Proceedings of the IEEE Computers and Digital Technologys, Vol. 148, Isu. 6, pp. 207-213.
[61] Z. K. Yang, W. M. Lang and Y. M. Tang (2004), “A New Fair Micropayment System based on Hash Chain,” IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 139-145.
[62] J. Zhu and J. Ma (2004), “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, Vol. 50, Isu. 1, pp. 231-235.