[AEK98] Anderson, R., Biham, E., and Knudsen, L., “Serpent: a proposal for the advanced encryption standard,” 1st AES Conference, 1998.
[AES01] National Institute of Standards and Technology (NIST), “Advanced encryption standard (AES),” Federal Information Processing Standards Publication 197(FIPS 197), 2001.
[DES77] National Institute of Standards and Technology (NIST), “Data encryption standard (DES),” Federal Information Processing Standards Publication 46 (FIPS 46), 1977.
[DES99] National Institute of Standards and Technology (NIST), “Data encryption standard (DES),” Federal Information Processing Standards Publication 46-3 (FIPS 46-3), 1999.
[DH76] Diffie, W. and Hellman, M., “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, 1976, pp. 644-654.
[DSS91] National Institute of Standards and Technology (NIST), “Proposed federal information processing standard for digital signature standard (DSS),” Federal Register, Vol. 169, 1991, pp. 42980-42982.
[ElG85] ElGamal, T., “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions of Information Theory, Vol. 31, No. 4, 1985, pp. 469-472.
[GW07] Guo, L. and Wang, G., “Insider attacks on multi-proxy multi-signature schemes,” Computers and Electrical Engineering, Vol. 33, No. 2, 2007, pp. 88-93.
[HLL03] Hwang, M.S., Lu, E.J.L., and Lin, I.C., “A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 6, 2003, pp. 1552-1560.
[HMP94] Horster, P., Michels, M., and Petersen, H., “Authenticated encryption schemes with low communication costs,” Electronics Letters, Vol. 30, No. 15, 1994, pp. 1212-1213.
[ISO98] ISO 10118-3, “Information technology – security techniques – hash functions – part 3: dedicated hash-functions,” International Organization for Standardization, 1998.
[KC05] Kuo, W.C. and Chen, M.Y., “A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA05), 2005.
[KHW06] Kang, B., Han, J., and Wang, Q., “A new threshold multi-proxy multi-signature scheme,” Journal of Electronics (China), Vol. 23, No. 4, 2006, pp. 560-563.
[LCZL04] Li, X., Chen, K., Zhang, L., and Li, S., “Proxy structured multisignature scheme from bilinear pairings,” Lecture Notes in Computer Science, 2004, pp. 705-714.
[LZ07] Li, S. and Zhang, F., “A new multi-proxy signature from bilinear pairing,” Journal of Electronics (China), Vol. 24, No. 1, 2007, pp. 90-94.
[MO97] Mambo, M. and Okamoto, E., “Proxy cryptosystems: delegation of the power to decrypt ciphertexts,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 80, No. 1, 1997, pp. 54-63.
[MUO96a] Mambo, M., Usuda, K., and Okamoto, E., “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 79, No. 9, 1996, pp. 1338-1354.
[MOU96b] Mambo, M., Usuda, K., and Okamoto, E., “Proxy signatures for delegating signing operation,” Proceedings of the Third ACM Conference on Computer and Communications Security, 1996, pp. 48-57.
[NR93] Nyberg, K. and Rueppel, R.A., “A new signature scheme based on the DSA giving message recovery,” Proceedings of the First ACM Conference on Computer and Communications Security, 1993, pp. 58-61.
[PL05] Park, S.Y. and Lee, S.H., “Multi-proxy signatures based on diffie-hellman problems allowing repeated delegations,” Lecture Notes in Computer Science, Vol. 3597, 2005, pp. 340-344.
[Riv92] Rivest, R.L., “The MD5 message digest algorithm,” Request for Comment RFC 1321, 1992.
[RSA78] Rivest, R.L., Shamir, A., and Adleman, L.M., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
[Sch89] Schnorr, C.P., “Efficient identification and signatures for smart cards,” Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1990, pp. 235-251.
[Sch94] Schneier, B., “Description of a new variable-length key, 64-bit block cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191-204.
[SLH99] Sun, H.M., Lee, N.Y., and Hwang, T., “Threshold proxy signatures,” IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5, 1999, pp. 259-263.
[Sti95] Stinson, D.R., “Cryptography: Theory and practice,” CRC Press, 1995.
[WBZD04] Wang, G., Bao, F., Zhou, J., and Deng, R.H., “Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem",” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, 2004, pp. 1309-1311.
[WC07] Wang, Q., and Cao, Z., “Identity based proxy multi-signature,” The Journal of Systems and Software, Vol. 80, No. 7, 2007, pp. 1023-1029.
[XC04a] Xue, Q. and Cao, Z., “A threshold proxy signature scheme using self-certified public keys,” Lecture Notes in Computer Science, Vol. 3358, 2004, pp. 715-724.
[XC04b] Xue, Q. and Cao, Z., “Improvement of multi-proxy signature scheme,” Proceeding of International Symposium on Communications and Information Technologies, 2004, pp. 450-455.
[XWY07] Xie, Q., Wang, J., and Yu, X., “Improvement of nonrepudiable threshold multi-proxy threshold multi-signature scheme with shared verification,” Journal of Electronics (China), Vol. 24, No. 6, 2007, pp. 806-811.
[iT08] iThome編輯部,“研考會擬擴大全國機關採用線上文件簽核”, (http://www.ithome.com.tw/itadm/article.php
?c=50214),2008。
[王07] 王環信,“電子表單引爆企業生產力,可攜式電子產品設計”,(http://pdt.acesuppliers.com/meg/meg_1_02402361420
07178506173081_7969.html),2007。
[行03] 行政院秘書處編,“文書處理手冊”,文書處理手冊,2003。
[行04] 行政院秘書處編,“事務管理規則”,事務管理規則,2004。
[行07] 行政院研究發展考核委員會,“電子化政府96年度報告書”, 電子化政府96年度報告書,2007。
[行08] 行政院研究發展考核委員會,“公文電子化”,
(http://www5.www.gov.tw/left-to-right/elec.htm) ,2008。
[行09] 行政院研究發展考核委員會,“電子化政府推動現況與成果之國際評比” ,(http://www.rdec.gov.tw/ct.asp?xItem
=4087125&CtNode=9891&mp=100),2009。
[柯陳04] 陳瑞華,柯伶僡,“如何建置合法、可行的「線上簽核系統」-電子公文檔案管理系統”,檔案季刊,第三卷第三期, 頁62-73,2004。
[黃曾王季05] 黃金福,曾宇瑞,王敬仁,季延平,“公文線上簽核作業中資訊安全機制之研究--以行政院勞工委員會為例說明”,ERP學術與實務研討會,2005。
[黃08] 黃明仁,“電子表單系統導入之探討-以A公司為例”,國立中央大學資訊管理學系碩士學位論文,2008 年。[劉04] 劉文龍,“電子化政府之「公文線上簽核系統」探討”, 數位生活與網際網路科技研討會,2005。[劉05] 劉文龍,“電子公文線上簽核系統的規劃與設計”,國立中興大學資訊科學系碩士學位論文,2005。