中文部分
[1]郭強毅(民八九),「植基於弱通行碼建立安全的會議金匙」,中興大學資訊科學系碩士論文。[2]張德竟(民九十),「以密碼為基礎的動態會議金鑰系統」,交通大學資訊科學系碩士論文。[3]巫坤品、曾志光譯(民九十.九月),「密碼學與網路安全:原理與實務第二版」,碁峯資訊股份有限公司。
[4]林峻立(民九二),「使用者通行碼之身分驗證與金鑰交換協定」,中華民國資訊安全學會,資訊安全通訊第九卷,第三期,頁43-52。[5]「美伊戰爭誤擊事件評析」(民九二.四月三日),聯合報2版。
[6]「我國PKI互通管理及推動計畫-行動式PKI技術及應用研究報告」(民九二),工研院電通所。
[7]賴溪松、韓亮、張真誠(民九二.八月),「近代密碼學及其應用」,旗標出版股份有限公司。
[8]賴峙樺(民九二),「以橢圓曲線為基礎之簽密法的研究」,淡江大學資訊工程系碩士論文。[9]周伯錕(民九二),「利用智慧卡之遠端身分認證之研究」,中興大學資訊科學系碩士論文。[10]「資安事件頻傳 攘外必先安內」(民九二),凱隆智慧股份有限公司http://www.klitc.com/html_event/events031111-N.htm.
[11]黃裕彰譯(民九二.五月),「802.11無線網路技術通論」,美商歐萊禮O'reilly出版社。
[12]陳彥學(民九三),「無線區域網路認證技術簡介」,中華民國資訊安全學會,資訊安全通訊第十卷,第二期,頁78-92。[13]「個人資料遭盜賣 立委擬提國賠」 (民九三.五月二十八日), 聯合報A6版。
[14]「數字簽名遭遇911」(民九四),http://blog.xuite.net/hdc1/futurelife/107562。
[15]王偲穎(民九四),「動態會議金鑰分配機制之研究」,世新大學資訊管理系碩士論文。[16]許沁如(民九四),「結合智慧卡之通行碼認證機制研究」,世新大學資訊管理系碩士論文。[17]「智慧卡IC將成為全球電子身分識別方案」(民九四),電子工程專輯,http://www.eettaiwan.com/ART_8800374644_617723_8c77e4fe_no.HTM
[18]謝文川、趙士元、黃立璁(民九四.八月),「無線區域網路安全威脅與防護」,碁峯資訊股份有限公司。
[19]「4000萬張信用卡資料外洩」(民九四.六月十九日),自由電子報http://www.libertytimes.com.tw/2005/new/jun/19/today-int1.htm
[20]王智鵬、伍台國、陳正鎔(民九五),「身分識別安全策略之研究-以網路銀行為例」,2006年數位科技與創新管理國際研討會,華梵大學主辦,台北縣。
英文部分
[21]Ai-fen Sui, L.C.K.Hui, S.M.Yiu, K.P.Chow, W.W.Tsang, C.F.Chong, K.H.Pun , H.W.Chan [2005], “An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication ”, Wireless Communications and Networking Conference,vol.4,pp.2088-2093.
[22]A. Lawrence Gordon, Martin P. Loeb, Deloitte, Touche Faculty Fellow, William Lucyshyn, Robert Richardson ,2005 CSI/FBI Computer Crime and Security Survey ”, http://www.gocsi.com/ , 2006.
[23]A.Shamir [1984], “Identity-based cryptosystems and signature schemes ”,Proceedings CRYPTO’84,LNCS 196,pp.47-53.
[24]C.C.Lee,M.S.Hwang,and W.P.Yang [2002],“A flexible remote user authentication scheme using smart cards”,ACM Operating Systems Review,vol.36,no.3, pp.46-52.
[25]C.K.Chan and L.M.Cheng [2000], “Cryptanalysis of a remote user authentication scheme using smart cards”,IEEE Transactions on Consumer Electronics ,vol.46,no.4, pp.992-993.
[26]C.L.Hsu [2003], “Security of Chien et al.’s remote user authentication scheme using smart cards”,Computer Standards & Interfaces,Article in press.
[27]D. Johnson, A. Menezes and S. Vanstone [2001], “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1,Issue 1, Springer-Verlag, pp. 36-63.
[28]E.J.Yoon,K.Y.Yoo [2005], “More Efficient and Secure Remote User Authentication Scheme using Smart Cards”, IEEE 11th International Conference on Parallel and Distributed Systems - Workshops (ICPADS'05), pp.73-77.
[29]H.Luo,P.Zefros, J.Kong, S.Lu,and L.Zhang [2002], “Self-Securing Ad Hoc Wireless Networks”,The Seventh IEEE Symposium on Computer and Communications.
[30]H.M.Sun [2000] ,“An efficient remote user authentication scheme using smart cards”,IEEE Transactions on Consumer Electronics,vol.46,no.4,pp.958-961.
[31]H.Y.Chien,J.K.Jan, and Y.M.Tseng [2002], “An efficient and practical solution to remote authentication:smart cards ”,Computer & Security,vol.21,no.4,pp.372-375.
[32]J.R Chen, E.H Lu ,J.H Chiu, Y.I Cheng, P.L Chang [2006] , “Comment on Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Mobile communication”, Feng Chia University,12th Mobile Computing Workshop, pp 522-525.
[33]J.Kong,H.Luo, K.Xu, D.L.Gu, M.Gerla, and S.Lu [2002], “Adaptive Security for Multi-Layer Ad Hoc Networks”, Special Issue of Wireless Communication and Mobile Computing, Wiley Interscience Press.
[34]J.Hubaux,L.Buttyan, and S.Capkun [2001], “The Quest for Security in Mobile Ad Hoc Networks”, Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing.
[35]J.J.Shen , C.W.Lin ,and M.S.Hwang [2003], “A Modified Remote User Authentication Scheme Using Smart Cards” ,IEEE Transactions on Consumer Electronics,vol.49,no.2,pp.414-416.
[36]J.K.Lee, S.R.Ryu, and K.Y.Yoo [2002], “Fingerprint-based remote user authentication scheme using smart cards”, IEE Electronics Letters,vol.38,no.12,pp.554-555.
[37]J.Pollard [1978],“Monte Carlo methods for index computation mod P”, Mathematics of Computation,32,pp 918-924.
[38]L.Gong [1992], “A security risk of depending on synchronized clocks”, Operating Systems Review,vol.26,no.1,pp.49-53.
[39]M.Sahar Ghanem and Hussein Abdel-Wahab [2000], “A simple XOR- based technique for distributing group key in secure multicasting, ”In Proc. The Fifth IEEE Symposium on Computers and Communications , pp.166-171.
[40]M.S.Hwang and L.H.Li [2000], “A new remote user authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics, vol.46,no.1,pp.28-30.
[41]M.Steiner, G.Tsudik and M.Waidner [1995], “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review, Vol. 29, No. 3, pp. 22–30.
[42]NBS FIPS PUB 46-1 [1988], “Data Encryption Standard”, National Bureau of Standards, U.S.Department of Commerce.
[43]N.Koblitz [1987],“Elliptic curve cryptosystems”, Mathematics of Computation,vol.48,no.177,pp.203-209.
[44]R. Rivest, A. Shamir, and L. Adleman [1978],“A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM,vol.21,No.2, pp.120 –126.
[45]S. M. Bellovin and M.Merritt [1992] , “Encrypted key exchange password-based protocols secure against dictionary attacks”, IEEE Symposium on Research in Security and Privacy, pp.72–84.
[46]S.Vanstone [1997],“Elliptic curve cryptosystem - the answer to strong, fast public-key cryptography for securing constrained environments” , Information Security Technical Report Elsevier,vol.2,No. 2, pp.78-87.
[47]S.W.Lee,H.S.Kim, and K.Y.Yoo [2004], “Improved Efficient Remote User Authentication Scheme using Smart Cards”, IEEE Transactions on Consumer Electronics,vol.50,no.2,May,pp.565-567.
[48]T.ElGamal [1985],“A public key cryptosystem and a signature scheme based on discrete logarithms” IEEE Transactions on Information Theory,OL.IT-31,No. 4,pp. 469-472.
[49]U.S.Army Training and Doctrine Command [1995], “Conpects for Information Operations”, pp.525-526,America.
[50]V.S. Miller [1986], “ Use of elliptic curves in cryptography ”, Advances in Cryptology:Crypto’85,Springer-Verlag,pp.417-426.
[51]W.Diffie and M.Hellman [1976], “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644–654.
[52]Y. Ding and P. Horster [1995], “Undetectable on-line password guessing attacks,” ACM SIGOPS Operating Systems Review, vol.29, no.4, pp. 77–86, October.