|
參考文獻 [1]Zipcar,http://www.zipcar.com/ (retrieved date: July 16 2012). [2]Car2go,http://www.car2go.com/ (retrieved date: July 16 2012). [3]D. Slamanig, S. Rass,“Anonymous but transactions supporting selective traceability,” 5th International Conference on Security and Cryptography–SECRYPT 2010,pp.132–141,2010. [4]S. Wang, Z. Chen, X. Wang,“A new certificateless electronic cash scheme with multiple banks based on group signatures,” IEEE International Symposium on Electronic Commerce and Security,2008. [5]Y. Chen, J.S. Chou, H.M. Sun, M.H. Cho,“A novel electronic cash system with trustee-based anonymity revocation from pairing,” Electronic Commerce Research and Applications,Jun. 2010. [6]D. Meffert,“Bilinear Pairings in Cryptography,” in Master thesis, Radboud Universiteit Nijmegen,2009. [7]A. Shamir,“Identity-based cryptosystems and signature schemes,” Advances in Cryptology–Crypto’84, Lecture Notes in Computer Science,Vol. 196,Springer-Verlag,pp.47–53,1984. [8]J. Jonsson, B. Kaliski,“Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1,” RFC 3447 (Informational),Internet Engineering Task Force,Feb. 2003. [9]N. Koblitz,“Elliptic Curve Cryptosystems,” Math. Computation,Vol. 48,pp.203–209,1987. [10]V. Miller,“Use of Elliptic Curves in Cryptography,” Advances in Cryptology–Crypto ’85,pp.417–426,1986. [11]D. Jao,“Elliptic Curve Cryptography,” presented at Handbook of Information and Communication Security,pp.35–57,2010. [12]K. Lauter,“The advantages of elliptic curve cryptography for wireless security,” IEEE Wireless Communications,pp.62–67,2004. [13]A. Menezes, T. Okamoto, S. Vanston,“Reducing elliptic curve logarithms to logarithms in a finite field,” IEEE Transactions on Information Theory,pp.1639–1646,1993. [14]D. Boneh, M. Franklin,“Identity-based Encryption from the Weil pairing,” SIAM Journal of Computing,Vol. 2139,pp.586–615,2003. [15]International Organization for Standardization.ISO/IEC 18092-4.Information technology–Telecommunications and information exchange between systems–Near Field Communication–Interface and Protocol(NFCIP-1),2007. [16]R. Dutta, R. Barua, P. Sarkar,“Pairing-based cryptographic protocols : A Survey,” Cryptology ePrint Archive, Report 2004/064. [17]J. Zhang, Z. Wu, Y. Li,“An improved identity-based authenticated key agreement protocol using pairings,” International Conference on Computer Science and Network Technology,2011. [18]G. Van Damme, K. Wouters, H. Karahan, B. Preneel,“Offline NFC payments with electronic vounchers,” ACM Workshop on Networking, Systems,and Applications on Mobile Handhelds–MobiHeld 2009,pp.25–30,2009. [19]L. Gong, R. Needham, R. Yahalom,“Reasoning about Belief in Cryptographic Protocols,” IEEE Computer Society Symposium on Research in Security and Privacy,pp.234–248,1990.
|