|
中文部份 1.陳正鎔、胡世雄、孫屏台、陳俊憲(2008),“Payment Gateway 系統實作之研究”,2008 第四屆資訊管理學術暨專案管理實務國際研討會,開南大學。 2.陳正鎔、胡世雄、孫屏台、陳俊憲(2008),“無線網路身份識別機制之研究”,2008 第四屆資訊管理學術暨專案管理實務國際研討會,開南大學。 3.陳正鎔、孫屏台、莊世良、李坤森、吳宗翰(2008), “隱匿性TAG與RFID系統認證之研究”,2008 RFID 科技論文研討會,臺北科技大學。 4.陳正鎔、孫屏台、莊世良、李坤森、吳宗翰(2008),“處於風險性環境下之無線射頻認證機制探討”,2008第四屆資訊管理學術暨專案管理實務國際研討會,開南大學。 5.陳正鎔、吳宗翰、李坤森、莊世良、孫屏台(2008),“運用Fail-Stop策略達到防偽目的之探討-以非接觸式信用卡為例”,第十九屆國際資訊管理學術研討會,暨南大學。 6.鍾文榮(2002),電子支付工具中Micropayment機制之交易成本與效率分析,朝陽科技大學。 7.蔡宜潔(2005),探討電信帳單式小額行動付款交易協定,國立中央大學。 8.莊玉玲(2005),數位內容之電信帳號付款機制,世新大學。 9.曹壹登(2000),多樣化網際網路付款機制之設計與實作,台灣大學。 10.王智鵬、伍台國、陳正鎔(2006),”身份識別安全策略之研究-以網路銀行為例”,2006數位科技與創新管理國際研討會,華梵大學。 11.孫屏台、任素壯、陳正鎔(2000),”可承受超級入侵者之電子商務資訊安全管理策略”,第六屆資訊管理研究暨實務研討會,133頁。 12.VISA國際組織台灣網站:http://www.visa-asia.com/ap/tw/index.shtml。 13.MasterCard台灣網站: http://www.mastercard.com/tw/personal/zh/index.html。 14.廖珮君 Digitimes web site, http://www.digitimes.com.tw。 15.Payment Gateway之後台系統:https://paymallweb.igate.com.tw/login.php。 16.Payment Gateway之網路商店後台:https://paymallcp.igate.com.tw/login.php。 17.聯合勸募線上捐款平台:https://uwt.unitedway.org.tw/。 18.聯合勸募線上捐款後台:https://uwt.unitedway.org.tw/adm/web_login.php。 19.中華電信行動電話小額付款服務說明: http://www.emome.net/channel?chid=309&vcrm=200905311449@c466a4659ba3a6eeb2a98e8100ce5695。 20.中華電信EasyPay市話輕鬆付服務說明: http://service.impc.com.tw/front/bin/ptdetail.phtml?Part=new&Rcg=3。 21.中華電信Hinet AAA小額付款服務說明: http://aaaservice.hinet.net/User/index.html。 22.大眾電信PHS小額付款服務說明: http://www.phs.com.tw/customer/faq.asp?aaa=4&bbb=17。 23.台灣大哥大行動電話小額付款服務說明: https://www.catch.net.tw/member/member_signin.jsp?returnURL=http://www.catch.net.tw/mycatch/。 24.台灣中小企銀WEB ATM線上付款服務說明: https://eatm.tbb.com.tw/UserNotice.jsp。 25.便利超商線上付款服務說明: http://preproduct.seed.net.tw/products%20business/bc/bc.htm。 26..遊戲橘子CASH樂點卡服務說明: https://tw.gash.gamania.com/GASHLogin.aspx?NextURL=VirtualPaymentList.aspx。
英文部份 27.Antovski, Ljupco and Marjan Gusev(2003), “M-Payments”, 25th Int. Conf. Information Technology Interfaces ITI, P.95-100. 28.Mallat, Nilna, Matti Rossi and Virpi Kristiina Tuunainen(2004), “Mobile Banking Services”, Communications of the ACM, P.42-46. 29.Me, G.(2003), “Payment Security in Mobile Environment”, ACS/IEEE International Conference on Computer Systems and Applications. 30.Peha, Jon M. and Ildar M. Khamitov(2003), “PayCash: A Secure Efficient Internet Payment System”, Electronic Commerce Research and Applications Journal, 2004, P.381-388. 31.Roos, A., Hartman, M. and Dutnall, S., “Critical Issues for Roaming in 3G”, Wireless Communications, P.29-35. 32.Secker, Mathew(2002), “M-Payment—An Open Book: Globally Agreed M-Payment Standates are a Long Way Off But Do We Need Them Anyway”, Telecommunications. 33.Varshney, Upkar(2002), “Mobile Payments”, Wireless Communications, P.120-121. 34.Supakorn Kungpisdan, Bala Srinivasan, and Phu Dung Le(2004), “A Secure Account-Based Mobile Payment Protocol“ Network Computing, Monash Univesity,Australia , ITCC. 35.Mobile Payment Forum(2002), “Mobile payment forum white paper”. 36.Ljupco Antovski and Marjan Gusev(2003), “M-Payments”, 25th Int. Conf. Information Technology Interfaces /TI 2003, June 16-19, Cavtat, Croatia. 37.Kuen-Liang Sue ,Chung-Shien Tsai(2004), “Mobile Payment System Using Dynamic Transaction Numbers”. Institute of Information Management, National Central University. 38.Jia-Ie Shiue ,”A Study on Remote User Authentication Schemes”. 39.Yun-Jye Liao , “An Infrastructure of Authentication and Certification for Campus Network”. 40.D. Henrici and P. Mauller(2004), “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers”, PerSec’04 at IEEE PerCom, pp. 149-153. 41.David Molnar and David Wagner(2004), “Privacy and security in library RFID: issues, practices, and architectures” ,Conference on Computer and Communications Security CCS’04, pp. 210-219. 42.Jue-Sam Chou, Guey-Chuen Lee and Chung-Ju Chan(2007). “A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems”. Cryptology ePrint Archive, Report 2007/224, http://eprint.iacr.org/. 43.Katja Schmidt-Samoa. (2004), “Factorization-based Fail-Stop Signatures Revisited”, x edition, Publisher, Publish Location. 44.Kenneth H. Rosen(1988), “Elementary Number Theory and Its Applications” , Addison-Wesley, Reading, MA. 45.Kirk H.M. Wong, Patrick C.L. Hui and Allan C.K. Chan(2005), “Cryptography and authentication on RFID passive tags for apparel products” , Computer in Industry 57, pp. 342-349. 46.Miyako Ohkubo , Koutarou Suzuki and Shingo Kinoshita (2003), “Cryptographic approach to privacy-friendly tags” , RFID Privacy Workshop. 47.Simson Garfinkel and Beth Rosenberg(2005), “RFID Applications, Security, and Privacy”, Addison Wesley. 48.Willy Susilo, Rei Safavi-Naini, Marc Gysin and Jennifer Seberry (2000), “A New and Efficient Fail-stop Signature Scheme”, The Computer Journal. 49.Wayne Patterson(1987), “Mathematical Cryptology for Computer Scientists and Mathematicians”, Rowman.
|