[1] Bill Goodman, Bell Atlantic, “Internet Telephony and Modem Delay,” IEEE Network•May/June. 1999.
[2] Conexant, “Conexant soft modem,” available at
http://www.conexant.com/products/entry.jsp?id=121.
[3] Conexant, “Commands for Host-Processed and Host-Controlled Modems Reference Manual” Conexant, 2001, Conexant product specification available at
http://www.linuxant.com/drivers/hsf/free/archive/100498D_RM_HxF_Released.pdf.
[4] D.W. Hanson, “Fundamental of two-way time transfer by satellite”, 43rd Annual Symposium of Frequency Control, pp. 174-178, 1989.
[5] D.Kirchner, ”Two-way time transfer via communication satellites,” IEEE Proc.Vol.79, No.7, 1991.
[6] H. M. Sun and B. T. Hsieh, “On the Security of Some Proxy Signature Schemes, ” 2003.
[7] ITU, “About ITU” available at http://www.itu.int/net/about/index.aspx.
[8] J. Postel, “Daytime Protocol,” available at http://www.ietf.org/rfc/rfc867txt, 1981.
[9] J. Postel, K. Harrenstien , ” Time Protocol” available at http://www.ietf.org/rfc/rfc868.txt, 1983.
[10] Linuxant, “Conexant modem driver,” available at
http://www.linuxant.com/drivers/hsf/index.php.
[11] M.Mambo, K.Usuda, and E. Okmoto, “Proxy Signatures for Delegating Signing Operation,” ACM, 1996.
[12] NIST, “Computer Time Synchroniztion,” available at
http://tf.nist.gov/service/pdf/computertime.pdf.
[13] nCipher, ”Trust Time commercial white paper,” Datum, product specification, available at
http// www.ncipher.com/cryptophic_hardware/time_stamping/, 2002.
[14] Pei-yih Ting and Fang-dar Chu, “Enhancing the Security Promise of a Digital Time-Stamp,” Advanced Information, Networking, and Applications, AINA’08, Mar. 25, 2008, Japan.
[15] R. Housley, W. Ford, W. Polk, D. Solo, “Internet X.509 Public Key Infrastructure Certificate and CRL Profile” available at http://www.ietf.org/rfc/rfc2459.txt, 1999.
[16] S. Haber and W. Scott Stornetta , “How to Time-Stamp a Digital Document,” Jourmal of Cryptology, Vol. 3, No. 2, pp. 99-111, 1991.
[17] 財團法人全國認證基金會, “TAF追溯量測政策” available at
http://hr.taftw.org.tw/service/DocDownload.aspx?id=00000072, 2007.
[18] 倪行健, 「階層式可信賴時間源架構之運作機制與實作」, 碩士論文, 海洋大學, 2006.[19] 王峻彥, 「時戳服務模式與運作機制」,碩士論文, 海洋大學, 2002.