英文部分
1.Adams, C. “Simple and Effective Key Scheduling for Symmetric Ciphers”, Proceedings, Workshop in Selected Areas of Cryptography, SAC’94. 1994.
2.Alberto Partida and Diego Andina, “Applied Cryptography in Java”, 1999 IEEE
3.Beth, T., Frisch, M., and Simmons, G. eds. Public-Key Cryptography: State of the Art and Future Directions. NewYork: Spring-Verlag, 1991.
4.Biham, E., and Shamir, A. Differential Cryptanalysis of the Data Encryption Standard. NewYork: Spring Verlag, 1993.
5.Boneh, D. “Twenty Years of Attacks on the RSA Cryptosystem.” Notices of the American Mathematical Society, February 1999.
6.B.Scneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish).” Fast Software Encryption, Cambridge Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp 191-201.
7.Coppersmith, D. “The Data Encryption Standard (DES) and Its Strength against Attacks.” IBM Journal of Research and Development, May 1994
8.Cormen, T,; Leiserson, C.; Rivest, R.; and Stein, C. Introduction to Algorithms. Cambridge, MA: MIT Press, 2001.
9.Daeman, J., and Rijmen, V. AES Proposal Rijndael, Version 2. Submission to NIST, March 1999. http://csrc.nist.gov/encryption/aes.
10.Daemen, J., and Rijmen, V. “Rijndael: The Advanced Encryption Standard.” Dr.Dobb’s Journal, March 2001.
11.Davies, D., and Price, W. Security for Computer Networks. NewYork: Wiley, 1989.
12.Doroty E. Denning and Giovanni Maria Sacco, “Timestamps in Key Distribution Protocols.” Communications of the ACM, August 1981
13.Enge, A. Elliptic Curves and Their Applications to Cryptography. Norwell, MA; Kluwer Academic Publishers, 1999.
14.Hevia, A., and Kiwi, M. “Strength of Two Data Encryption Standard Implementations Under Timing Attacks.” ACM Transactions on Information and System Security, November 1999.
15.Jonathan Knudsen, “Java Cryptography” O’REILLY, March, 1999.
16.Jueneman, R.; Matyas, S.; and Meyer, C. “Message Authentication.” IEEE Communications Magazine, September 1988.
17.Koblitz, N. “Elliptic Curve Cryptosystems.” Mathematics of Computation Vol. 48, Number 177, January 1987, pp 203-209.
18.Lidl, R., and Niederreiter, H. “Introduction to Finite Fields and Their Applications.” Cambridge: Cambridge University Press, 1994.
19.Murphy, S. “The Cryptanlysis of FEAL-4 with 20 Chosen Plaintexts.” Journal of Cryptography, No. 3, 1990.
20.National Transportation Communications for ITS Protocol (NTCIP) Guide, NTCIP Joint Standards Committee, Draft Version 2, 1997。
21.Rich Helton and Johennie Helton, “JavaTM Security Solutions”, 2004.
22.Rivest. R., Shamir, A., and Adleman, L. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems.” Communications of the ACM, February 1978.
23.Robert R. Klein III, MD; David W. Mount, PhD; Ray B. Nagle, MD, PhD,”Modern Data Security.” Arch Pathol Lab Med-Vol 128, March 2004.
24.Simmons, G., ed. Contemporary Cryptography: The Science of Information Integrity. Piscataway, NJ: IEEE Press, 1992.
25.Scott Oaks, “Java Security” O’REILLY, February, 2002.
26.William Stallings, “Cryptography and Network Security-Principles and Practices Third Edition”, May 2004.
27.Whitfield Diffie and Martin E. Hellman, Member, IEEE “New Directions in Cryptography.” Proceedings of the AFIPS National Computer Conference, June 1976.
28.http://www.bouncycastle.org/
中文部份
29.張有恆,「運輸學」,1993。
30.王文中,「EXCEL於資料分析與統計學上的應用」,博碩文化股份有限公司,1997年9月。
31.阮韻芳譯。Jonathan Knudsen原著,「JAVA密碼學」,1999年3月。
32.楊豐瑞,楊豐任,「網路概論與實務」,松崗電腦圖書資料股份有限公司,2001年1月。
33.中華智慧型運輸系統協會,「台灣地區智慧型運輸系統實驗城規劃計畫(一)&(二)」,交通部委託研究計劃,2001年3月。
34.胡育銘,「應用資訊安全於分散式測驗系統之研究」,國立台南師範學院資訊教育研究所碩士論文,2002年6月。35.黃韋凱,「台灣地區專用交通管理資訊庫(TMIB)之研究」,國立台灣大學土木工程所交通組研究所碩士論文,2003年6月36.王青青,巫坤品譯,William Stallings原著,「密碼學與網路安全原理與實務第三版」,��峯資訊股份有限公司,2004年5月。
37.王旭正,柯宏叡「密碼學與網路安全理論、應用與實務」,博碩文化股份有限公司,2004年5月。
38.中華智慧型運輸系統協會,「符合NTCIP的無線寬頻ATMS交控示範系統(一)」,交通部委託研究計劃,2004年12月。
39.交通部,「都市交通控制通訊協定3.0版」,2004年11月。
40.陳佳良,「NTCIP物件利用GPRS傳輸之時間可靠度研究」,國立台灣大學土木工程所交通組研究所碩士論文,2005年6月。41.交通部運研所網站(http://www.iot.gov.tw/mp.asp?mp=1)
42.冠陞工程企業有限公司(http://www.kangsang.com.tw/control_center.htm)