[1]吳虹儀(2005),行動網路身份認證服務之研究,朝陽科技大學,台中。[2]周文卿(2006)ITIS智網,2006台灣電子商務市場規模挑戰1500億元 2007持續成長,資策會MIC。
[3]啟真工作室(2004) MCAD/MCSD 專業認證訓練手冊-使用VB.NET與C#.NET開發XML Web Service與伺服器元件,(初版),�眳p出版社,原著:Microsoft。
[4]莊添發(2006),Wi-Fi Hacking!無線網路駭客現形攻防戰,(初版),旗標出版社。
[5]陳孟廷(2002),以Web Service 為基礎的行動協同商務之研究,大葉大學、彰化。[6]陳泰碩(2004),導入Web Services 技術建置行動商務平台之研究,南台科技大學,台南。[7]陳貴琬(2004),行動商務之個人化交易研究,朝陽科技大學,台中。[8]黃裕彰(2003),802.11無線網路技術通論,(初版),O’REILLY,原著:Mattbew S.Gast, 802.11Wireless Network:The Definitive Guide。
[9]資安論壇,修改MAC位址欺騙設備的三招,http://forum.icst.org.tw/phpBB2/viewtopic.php?t=8035
[10]資策會資訊市場情報中心,http://mic.iii.org.tw/intelligence/
[11]劉彥博等(2007),Windows Mobile平台應用與開發,(初版),文魁資訊股份有限公司。
[12]謝文川等(2005),無線區域網路安全威脅與防護,(初版),�眳p出版社。
[13]J. A. MacDonald and C. J. Mitchell(2005 ), “Using The GSM/UMTS SIM to Secure Web Services,” Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, pp. 70-78.
[14]M. Burstein, C. Bussler, M. Zaremba, and T. Finin, “A Semantic Web Services Architecture,” IEEE Internet Computing, Vol. 9 No. 5, 2005, pp. 72-81.
[15]T. C. Yeh, H. Y. Shen and J. J. Hwang, “A Secure One-Time Password Authentication Scheme Using Smart Cards,” IEICE Transactions on Communications, Vol. E85, No. 11, 2002, pp. 2515-2518.
[16]K. Chen, C. Xu, and F. Yu(2007), “The Implementation of Evidence Theory in Mobile E-Business Payment,” Proceedings of the Workshop on Intelligent Information Technology Application, pp. 214-217.
[17]Veerse, F. M. (1999), “Mobile Commerce Report,” Durlacher Research Ltd.,London, pp. 1-79.
[18]G. Horn, Keith M. Martin and Chris J. Mitchell(2002), “Authentication protocol for mobile network environment value-added service,”IEEE Transactions on Vehicular Technology, Vol. 51, No. 2, pp. 383-391.
[19]H. Hwang, G. Jung, K. Sohn and S. Park(2008), “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP,” ICISS International Conference on Information Science and Security, pp. 164-170.
[20]E. J. Yoon and K. Y. Yoo(2006), “One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity, ”Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006), pp. 303-311.
[21]E. Lee, J. D. Tygar and M. Hearst(2006), “Study on security policy options for responding to phishing,” Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 189-195.
[22]Y. Lei, D. Chen and Z. Jiang(2004), “Generating digital signatures on mobile devices,” Proceedings of the 18th International Conference on Advanced Information Networking and Applications, Vol. 2, pp. 532.
[23]Krueger, M.(2001), The Future of M-Payments -Business Options and Policy Issues, ftp://ftp.jrc.es/pub/EURdoc/eur19934en.pdf
[24]Kalakota, R., and Robinson. M(2001), M-Business: The Race to Mobility,McGraw-Hill.
[25]A. Tsalgatidou and E. Pitoura(2001), “Business models and transactions in mobile electronic commerce: requirements and properties,” Computer Networks, Vol. 37, pp. 221-236.
[26]AirSnort , http://airsnort.shmoo.com/
[27]GSM World, http://www.gsmworld.com
[28]iKey, http://www.ittec.com.tw/product/ikey.htm
[29]Mobile Payment Forum White Paper, December 2002.
[30]Microsoft Corporation, http://www.microsoft.com/
[31]MyGeneration''s Free .NET Architecture,http://www.mygenerationsoftware.com/portal/Home/tabid/36/Default.aspx
[32]OpenNETCF Consulting, LLC, http://www.opennetcf.com/
[33]Simple Object Access Protocol, http://www.w3.org/TR/soap/
[34]The dOOdads .NET Architecture, http://www.mygenerationsoftware.com/portal/dOOdads/Overview/tabid/63/Default.aspx