|
Abadi, M. and Rogaway, P., “Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption),” Journal of Cryptology, Vol. 15, No. 2, 2002, pp.103-127. Barchett, L. D., Banerji, A., Tracey, J. M. and Cohn, D. L., “Problems Using MD5 with IPv6,” Performance Evaluation 27-28, 1996, pp. 507-518. Becker, H. J. and Ravitz, J. L., “Computer Use by Teachers: Are Cuban’s Predictons Correct?” AERA Annual Meeting, New Mexico, 2001. Berson, T. A., “Differential Cryptanalysis Mod 232 with Application to MD5,” Advances in Cryptology, Proc. Eurocrypt’92, Springer Verlag, 1993, pp. 71-80. Beumier, C. and Acheroy, M., “Automatic 3D Face Authentication,” Image and Vision Computing, Vol.18, 2000, pp. 315-321. Biham, E. and Shamir, A., “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology, Vol. 4, No.1, 1991, pp. 3-72. Bodmann, S. M., and Robinson, D. H., “Speed and Performance Differences Among Computer-Based and Paper-Pencil Tests,” Journal of Educational Computing Research, Vol. 31, No. 1, 2004, pp. 51-60. Boer, B. den and Bosselaers, A., “Collisions for the Compression Function of MD5,” Advances in Cryptology, Proc. Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer Verlag, 1994, pp. 293-304. Bosselaers, A., Govaerts, R. and Vandewalle, J., “Fast hashing on the Pentium,” Advances in Cryptology, Proceedings Crypto'96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298-312. Brinkerhoff, J. and Koroghlanian, C. M., “Student Computer Skills and Attitudes Toward Internet-Delivered Instruction: An Assessment of Stability Over Time and Place,” Journal of Educational Computing Research, Vol. 32, No. 1, 2005, pp. 27-56. Chang, Z. C., Computer Cryptography and Information Security (in Chinese), Unalis Corporation, Taipei, 1989. Chien, H. Y. and Jan, J. K., “Improved Authenticated Multiple-Key Agreement Protocol without Using Conventional One-Way Function,” Applied Mathematics and Computation, No. 147, 2004, pp. 491-497. Chien, P. Y., “Teacher Stress in Taiwanese Primary Schools,” Journal of Educational Enquiry, Vol. 5, No. 2, 2004, pp. 86-104. Chin, G., “Software Protecting in Internet (in Chinese),” PC World, Vol. 52, 2001. Also at http://www.pcworld.com.cn/2000/back_issues/2052/5211c.asp. Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE IT, Vol. 22, 1976, pp. 644-654. Dobbertin, H., Bosselaers, A. and Preneel, B., “The RIPEMD-160 Cryptographic Hash Function,” Dr. Dobb’s Journal, Vol. 22, No. 1, Jan. 1997. Dobbertin, H., “RIPEMD with Two-Round Compress Function Is Not Collision-Free,” Journal of Cryptology, Vol. 10, No. 1, 1997, pp. 51-69. Dobbertin, H., “Cryptanalysis of MD4,” Journal of Cryptology, Vol. 11, No. 4, 1998, pp. 253-271. Downes, T., “Blending Play, Practice and Performance: Children’s Use of the Computer at Home,” Journal of Education Enquiry, Vol. 3, No. 2, 2002, pp. 21-34. Drakopoulos, E., “Enterprise Network Planning and Design: Methodology and Application,” Computer Communications, Vol. 22, 1999, pp. 340-352. Fan, Network Computer-Introspection after Fervor (in Chinese), 1995. Available at http://www.microsoft.com/taiwan/products/windows/win95/netpc.htm Horng, G. B., “Password Authentication without Using a Password Table,” Information Processing Letters, No. l, 55, 1995, pp. 247-250. Hsiau, S. N., Technology/Power/Education: The Research for Teaching Meanings and Hidden Influences of Information Technology in Elementary Schools, Ph. D. Dissertation, National University of Tainan, 2004. Huang, S. Y., “Education Students’ Perceptions of Computers: A Cross-Cultural Study,” Journal of Educational Computing Research, Vol. 29, No. 4, 2003, pp. 451-469. Hwang, R. J., Lai, C. H., and Pen, J. C., “Cryptanalysis of Publicly Verifiable Authenticated Encryption,” National Computer Symposium, 2003, pp. 1396-1397. Jefferies, P., Grodzinsky, F. and Griffin, J., “Advantages and Problems in Using Information Communication Technologies to Support the Teaching of a Multi-institutional Computer Ethics Course,” Journal of Education Media, Vol. 28, No. 2-3, 2003, pp. 191-202. Jenkins, J. M., “Teaching for Tomorrow: The Changing Role of Teachers in the Connected Classroom,” Open Classroom Conference, 1999. Kippen, S., “Teacher Reflection and Theories of Learning Online,” Journal of Education Enquiry, Vol. 4, No. 1, 2003, pp. 19-30. Kwon, T. and Song, J., “Efficient and Secure Password-Based Authentication Protocols Against Guessing Attacks,” Computer Communications, Vol. 21, 1998, pp. 853-861. Lai, Y. L., Using SoftICE (in Chinese), Posts & Telecommunications Press, Beijing, 2002, pp.225-257. Lampson, B., Abadi, M., and Burrows M., “Authentication in Distributed Systems: Theory and Practice,” ACM Transactions on Computer Systems, Vol. 10, No. 4, Nov. 1992, pp. 265-310. Lim, C. P. and Barnes, S., “Those Who Can, Teach-The Pivotal Role of the Teacher in the Information and Communication Technologies (ICT) Learning Environment,” Journal of Educational Media, Vol. 27, No. 1-2, 2002, pp. 19-40. Lindsay, W. and Mclaren, S., “The Internet: an Aid to Student Research or a Source of Frustration?” Journal of Educational Media, Vol. 25, No. 2, 2000, pp.115-128. Liu, X., Chen, T., and Kumar, B. V. K. V., “Face Authentication for Multiple Subjects Using Eigenflow,” Pattern Recognition, Vol. 36, 2003, pp. 313-328. Mao, C. Z., Computers in Your Future 3(in Chinese), Gotop Information, Taipei, 2001, pp. 3-14. Oorschot, P. C. van and Wiener, M. J., “Parallel Collision Search with Cryptanalytic Applications,” Journal of Cryptology, Vol. 12, No. 1, 1999, pp. 1-28. Pirkul, H. and Gupta, R.,”Topological Design of Centralized Computer Networks,” Int. Trans. Opl Res., Vol. 4, No. 1, 1997, pp. 75-83. Ralph, C. M., “A Fast Software One-Way Hash Function,” Journal of Cryptology, Vol. 3, 1990, pp. 43-58. Renaud, K. and Angeli, A. D., “My Password Is Here! An Investigation into Visuo-Spatial Authentication Mechanisms,” Interacting with Computer, Vol. 16, 2004, pp. 1017-1041. Rivest, R. “The MD4 Message-Digest Algorithm,” RFC 1320, MIT LCS and RSA Data Security, Inc., Apr. 1992. Rivest, R., “The MD5 Message-Digest Algorithm,” RFC 1321, MIT and RSA Data Security, Inc, Apr. 1992. Ruffer, S. M., Yen, D., and Lee, S., “Client/Server Computing Technology: A Framework for Feasibility Analysis and Implementation,” International Journal of Information Management, Vol. 15, No. 2, 1995, pp. 135-150. Scheines, R., Leinhardt, G., Smith, J. and Cho, K. S., “Replacing Lecture with Web-Based Course Materials,” Journal of Educational Computing Research, Vol. 32, No. 1, 2005, pp. 1-26. Selwyn, N. and Brown, P., “Education, Nation states and the Globalization of Information Networks,” Journal of Education Policy, Vol. 15, No. 6, 2000, pp. 661-682. Stables, A., “Learning, Identity and Classroom Dialogue,” Journal of Educational Enquiry, Vol. 4, No. 1, 2003, pp. 1-18. Stallings, W., Cryptography and Network Security: Principles and Practices 3rd Edition, Prentice Hall, Upper Saddle River, N.J., Chapter 12, 2003, pp.380-413. Stinson, D., Cryptography: Theory and Practice, Chapman & Hall, Boca Raton, 2002, Chapter 4, pp.117-149. Sung, Z., Mimaxue (in Chinese), Multi-Channel, Beijing, 2002, pp. 136-151. Tanenbaum, A. S., Distributed Operating Systems, Prentice Hall, Englewood Cliffs, N.J., 1999, pp. 1-39. Tsai, M. J., “Do Male Students Often Perform Better Than Female Students When Learning Computers?: A Study of Taiwanese Eighth Graders’ Computer Education Through Strategic and Cooperative Learning,” Journal of Educational Computing Research, Vol. 26, No. 1, 2002, pp. 67-85. Tsai, M. J. and Tsai C. C., “Student Computer Achievement, Attitude, and Anxiety: The Role of Learning Strategies,” Journal of Educational Computing Research, Vol. 28, No. 1, 2003, pp. 47-61. Touch, J. D., “Performance Analysis of MD5,” ACM SIGCOMM Computer Communication Review, Vol. 25, Issue 4, Oct. 1995, pp. 77-86. Wang, Z. M., Linux Fedora Code 2 (in Chinese), King Information, Taipei, 2004, pp.1-2-1-4. Wasserman, E. and Millgram, Y., “Changes in the Approaches of Teachers Following Computerization of Schools,” Journal of Educational Computing Research, Vol. 32, No. 3, 2005, pp. 241-264. Wei, D., “Efficiency Comparison of the Most Commonly Used Cryptographic Algorithm”, 2004. http://www.eskimo.com/~weidai/benchmarks.html Wu, T. C. and Sung, H. S., “Authenticating Passwords Over an Insecure Channel,” Computer and Security, Vol. 15, No. 5, 1996, pp. 431-439. Wu, T. H., A Solution of Software Protection for Application Service Provider, thesis for master’s degree, Department of Computer Science and Information Engineering, Tung-Hai University, 2001. Yeh, H. T. and Sun, H. M., “Password-Based User Authentication and Key Distribution Protocols for Client-Server Applications,” The Journal of System and Software, No. 72, 2004, pp. 97-103. Zhang, F. G. and Kim, K. G., “Cryptanalysis of Lee-Hwang-Li’s Key Authentication Scheme,” Applied Mathematics and Computer, No. 161, 2005, pp. 101-107. Zilker, M. and Heimann, P., “High-Speed Data Acquisition with the Solaris and Linux Operating Systems,” Fusion Engineering and Design, Vol. 48, 2000, pp. 193-197.
|