|
iThome 即時新聞 - 中國信託繳費中心網站外洩大量用戶個資,2013 http://www.ithome.com.tw/itadm/article.php?c=80303 Acedo, F. J., Barroso, C., and Galan, J. L., "The resource-based theory: dissemination and main trends", Strategic Management Journal, (27:7), 2006, pp 621-636. Akyildiz, I. F., Weilian, S., Sankarasubramaniam, Y., and Cayirci, E., "A survey on sensor networks", IEEE Communications Magazine, (40:8), 2002, pp 102-114. Albrechtsen, E., "A qualitative study of users'' view on information security", Computers & Security, (26:4), 2007, pp 276-289. Alvarez, G., and Li, S., "Some basic cryptographic requirements for chaos-based cryptosystems", International Journal of Bifurcation and Chaos, (16:5), 2006, pp 2129-2151. Anderson, E. E., and Choobineh, J., "Enterprise information security strategies", Computers & Security, (27:1–2), 2008, pp 22-29. Anderson, J. M., "Why we need a new definition of information security", Computers & Security, (22:4), 2003, pp 308-313. Behnia, S., Akhshani, A., Mahmodi, H., and Akhavan, A., "A novel algorithm for image encryption based on mixture of chaotic maps", Chaos, Solitons & Fractals, (35:2), 2008, pp 408-419. Beige, A., Englert, B.-G., Kurtsiefer, C., and Weinfurter, H., "Secure communication with a publicly known key", Acta Physica Polonica A, (101), 2002, pp 357–368. Bennett, C. H., and Brassard, G., "Quantum Cryptography: Public Key Distribution and Coin Tossing", Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 1984, pp 175-179. Bennett, C. H., Brassard, G., Crepeau, C., and Maurer, U. M., "Generalized privacy amplification", IEEE Transactions on Information Theory, (41:6), 1995, pp 1915-1923. Boneh, D., and Franklin, M., "Identity based encryption from the Weil pairing", SIAM Journal of Computing, (32:3), 2003, pp 586-615. Branciard, C., Gisin, N., Lutkenhaus, N., Luetkenhaus, N., and Scarani, V., "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography", Quantum Information & Computation, (7:7), 2007, pp 639-664. BS7799, Information security management- Part 1: Code of practiice for information security management, BSI, 1999a BS7799, Information security management- Part 2: Code of practiice for information security management, BSI, 1999b Burrows, M., Abadi, M., and Needham, R., " A logic of authentication", ACM Transactions on Computer Systems, (8), 1990, pp 18–36. Chang, C., and Hung, S., "Distinct Journal Preference of Successful EC Researchers: A Citation Analysis", Electronic Commerce Studies, (2:1), 2004, pp 1-18. Chaum, D. L., "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, (24:2), 1981, pp 84-90. Chen, C., Chen, Z., and Li, Y., "Characterizing and defending against divide-conquer-scanning worms", Computer Networks, (54:18), 2010, pp 3210-3222. Chen, L.-C., and Lien, Y.-H., "Using author co-citation analysis to examine the intellectual structure of e-learning: A MIS perspective", Scientometrics, (89:3), 2011, pp 867-886. Clarke, R., "Information technology and dataveillance", Communications of the ACM, (31:5), 1988, pp 498-512. Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T., "Secure spread spectrum watermarking for multimedia", IEEE Transactions on Image Processing, (6:12), 1997, pp 1673-1687. Csiszar , I., and Korner, J., "Broadcast channels with confidential messages", IEEE Transactions on Information Theory, (24:3), 1978, pp 339-348. Culnan, M., "Mapping the intellectual structure of MIS, 1980-1985: a co-citation analysis", MIS Quarterly, (11:3), 1987, pp 341-353. Culnan, M. J., "The intellectual development of management information systems, 1972-1982: a co-citation analysis", Management Science, (32:2), 1986, pp 156-172. Debuisschert, T., and Fossier, S., "Security analysis of the time-coding quantum key distribution protocols", Quantum Information & Computation, (11:11-12), 2011, pp 968-987. Denning, D. E., "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, (13:2), 1987, pp 222-232. Diffie, W., and Hellman, M., "New directions in cryptography", IEEE Transactions on Information Theory, (22:6), 1976, pp 644-654. Ding, Y., "Semantic Web: Who is who in the field - a bibliometric analysis", Journal of Information Science, (36:3), 2010, pp 335-356. Ding, Y., Chowdhury, G., and Foo, S., "Mapping the intellectual structure of information retrieval studies: an author co-citation analysis, 1987-1997", Journal of Information Science, (25:1), 1999, pp 67-78. Dolev, D., and Yao, A., "On the security of public key protocols", IEEE Transactions on Information Theory, (29:2), 1983, pp 198-208. ElGamal, T. A., " A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, (31), 1985, pp 469–472. Forcht, K. A., Computer security management, Boyd & Fraser Pub. Co., 1994 Fung, C.-H. F., Tamaki, K., Qi, B., Lo, H.-K., and Ma, X., "Security proof of quantum key distribution with detection efficiency mismatch", Quantum Information & Computation, (9:1-2), 2009, pp 131-165. Galvagno, M., "The intellectual structure of the anti-consumption and consumer resistance field An author co-citation analysis", European Journal of Marketing, (45:11-12), 2011, pp 1688-1701. Gao, F., Guo, F., Wen, Q., and Zhu, F., "Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication", Science in China Series G: Physics, Mechanics and Astronomy, (51:5), 2008, pp 559-566. Gao, F., Qin, S.-J., Wen, Q.-Y., and Zhu, F.-C., "Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state", Optics Communications, (283:1), 2010, pp 192-195. Gerber, M., and Solms, R. v., "From Risk Analysis to Security Requirements", Computers & Security, (20:7), 2001, pp 577-584. Gisin, N., Ribordy, G. g., Tittel, W., and Zbinden, H., "Quantum cryptography", Reviews of Modern Physics, (74), 2002, pp 145–195. Gold, S., "Understanding the hacker psyche", Network Security, (2011:12), 2011, pp 15-17. Goldreich, O., Goldwasser, S., and Micali, S., "How to construct random functions", Journal of the ACM, (33:4), 1986, pp 792-807. Goldwasser, S., and Micali, S., "Probabilistic encryption", Journal of Computer and System Sciences, (28:2), 1984, pp 270-299. Goldwasser, S., Micali, S., and Rivest, R. L., "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal on Computing, (17:2), 1988, pp 281-308. Gottesman, D., Lo, H.-K., Lutkenhaus, N., and Preskill, J., "Security of quantum key distribution with imperfect devices", Quantum Information & Computation, (5), 2004, pp 325-360. Grover, V., Ayyagari, R., Gokhale, R., Lim, J., and Coffey, J., "A Citation Analysis of the Evolution and State of Information Systems within a Constellation of Reference", Journal of the Association for Information Systems, (7:5), 2006, pp 270-325. Hone, K., and Eloff, J. H. P., "Information security policy — what do international information security standards say?", Computers & Security, (21:5), 2002, pp 402-409. Hancock, B., "Security crisis management — the basics", Computers & Security, (21:5), 2002, pp 397-401. He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., "A strong user authentication scheme with smart cards for wireless communications", Computer Communications, (34:3), 2011, pp 367-374. He, H., Hu, M., Zhang, W., Zhang, H., and Yang, a. Z. 2005. "Topology-based macroscopical response and control technology for network security event," in Computational Intelligence and Security, Pt 2, Proceedings, pp. 560-566. Hedstrom, K., Kolkowska, E., Karlsson, F., and Allen, J. P., "Value conflicts for information security management", The Journal of Strategic Information Systems, (20:4), 2011, pp 373-384. Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T., and Weitzner, D., "Web science: an interdisciplinary approach to understanding the web", Communications of the ACM, (51:7), 2008, pp 60-69. Hillery, M., Bužek, V., and Berthiaume3, A., "Quantum secret sharing", Physical Review A, (59), 1999, pp 1829–1834. Hsiao, C. H., and Yang, C., "The intellectual development of the technology acceptance model: A co-citation analysis", International Journal of Information Management, (31:2), 2011, pp 128-136. Hu, C.-P., Hu, J.-M., Gao, Y., and Zhang, Y.-K., "A journal co-citation analysis of library and information science in China", Scientometrics, (86:3), 2011, pp 657-670. Hu, Q., Hart, P., and Cooke, D., "The role of external and internal influences on information systems security – a neo-institutional perspective", The Journal of Strategic Information Systems, (16:2), 2007, pp 153-172. Hung, S., Hung, W., Kang, T., and Tang, K., "Publication Productivitiy of IS Researchers in the Pacific Asia Region: An Analysis of DSS and I&M Journals (2003-2007)", Pacific Asia Journal of the Association for Information Systems, (1:2), 2009, pp 38-53. Huttner, B., Imoto, N., Gisin, N., and Mor, T., "Quantum cryptography with coherent states", Physical Review A, (51:3), 1995, pp 1863-1869. Hwang, K., Kwok, Y.-K., Song, S., Chen, M. C. Y., Chen, Y., Zhou, R., and Lou, X., "GridSec: Trusted grid computing with security binding and self-defense against network worms and DDoS attacks", Computational Science -ICCS 2005 (3516), 2005, pp 187-195. Inamori, H., Lutkenhaus, N., and Mayers, D., "Unconditional security of practical quantum key distribution", The European Physical Journal D, (41:3), 2007, pp 599-627. ISO/IEC17799, Information technology-code of practice for information security management, I. I. O. f. Standardization), 2000 Jia, Z., Lin, X., Tan, S.-H., Li, L., and Yang, Y., "Public key distribution scheme for delay tolerant networks based on two-channel cryptography", Journal of Network and Computer Applications, (35:3), 2012, pp 905-913. Juels, A., "RFID security and privacy: a research survey", Selected Areas in Communications, IEEE Journal on, (24:2), 2006, pp 381-394. Karlsson, A., Koashi, M., and Imoto, N., "Quantum entanglement for secret sharing and secret splitting", Physical Review A, (59:1), 1999, pp 162-168. Kaspersky - Kaspersky Lab Confirms Flashfake / Flashback Botnet Infected more than 600,000 Mac OS X Computers, Describes Ramifications and Remedies, 2012a http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_Confirms_Flashfake_Flashback_Botnet_Infected_more_than_600_000_Mac_OS_X_Computers_Describes_Ramifications_and_Remedies Kaspersky - The menace on your mobile – six times as much malware found in 2011, 2012b http://www.kaspersky.com/about/news/virus/2012/The_menace_on_your_mobile_six_times_as_much_malware_found_in_2011 Koblitz, N., "Elliptic Curve Cryptosystem", Computer Journal of Mathematics Computation, (48:3), 1987, pp 203-209. Kruskal, J. B., "Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis", Psychometrika, (29:1), 1964, pp 1-27. Kshetri, N., "The simple economics of cybercrimes", IEEE COMPUTER SOCIETY, (4:1), 2006, pp 33-39. Lamport, L., "Password authentication with insecure communication", Communications of the ACM, (24:11), 1981, pp 770-772. Lee, W. H., "How to identify emerging research fields using scientometrics: An example in the field of Information Security", Scientometrics, (76:3), 2008, pp 503-525. Leifer, R., and Mills, P. K., "An Information Processing Approach for Deciding upon Control Strategies and Reducing Control Loss in Emerging Organizations", Journal of Management Information Systems, (22:1), 1996, pp 113-137. Leydesdorff, L., and Vaughan, L., "Co-occurrence matrices and their applications in information science: Extending ACA to the Web environment", Journal of the American Society for Information Science and Technology, (57:12), 2006, pp 1616-1628. Li, C.-T., and Hwang, M.-S., "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, (33:1), 2010, pp 1-5. Liao, I.-E., Lee, C.-C., and Hwang, M.-S., "A password authentication scheme over insecure networks", Journal of Computer and System Sciences, (72:4), 2006, pp 727-740. Lidong, Z., and Haas, Z. J., "Securing ad hoc networks", IEEE Network, (13:6), 1999, pp 24-30. Liu, Z., "Visualizing the intellectual structure in urban studies: A journal co-citation analysis (1992-2002)", Scientometrics, (62:3), 2005, pp 385-402. Lo, H.-K., and Chau, H. F., "Unconditional security of quantum key distribution over arbitrarily long distances", Science (283), 1999, pp 2050–2056. Lo, H.-K., Chau, H. F., and Ardehali, M., "Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security", Journal of Cryptology, (18:2), 2005, pp 133-165. Loch, K. D., Houston, H. C., and Warkentin, M. E., "Threats to Information Systems: Today''s Reality, Yesterday''s Understanding", MIS Quarterly, (16:2), 1992, pp 173-186. Maurer, U. M., "Secret key agreement by public discussion from common information", IEEE Transactions on Information Theory, (39:3), 1993, pp 733-742. Mayers, D., "Unconditional security in quantum cryptography", Journal of the ACM, (48:3), 2001, pp 351-406. Mayers, D., and Salvail, L., "Quantum oblivious transfer is secure against all individual measurements", Workshop on Physics and Computation, 1994. PhysComp ''94, Proceedings., 1994, pp 69-77. McCain, K. W., "Mapping authors in intellectual space: A technical overview", Journal of the American Society for Information Science, (41:6), 1990, pp 433-443. Mollick, E., "Tapping into the underground", Sloan Management Review, (46:4), 2005, pp 21–24. Needham, R. M., and Schroeder, M. D., "Using encryption for authentication in large networks of computers", Communications of the ACM, (21:12), 1978, pp 993-999. Neumann, P. G., Computer Related Risks, 1995 Niekerk, J. F. V., and Solms, R. V., "Information security culture: A management perspective", Computers & Security, (29:4), 2010, pp 476-486. Oliveira, L. B., Aranha, D. F., Gouvea, C. P. L., Scott, M., Camara, D. F., Lopez, J., and Dahab, R., "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks", Computer Communications, (34:3), 2011, pp 485-493. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E., "SPINS: security protocols for sensor networks", Wireless Networks, (8:5), 2002, pp 521-534. Pilkington, A., and Meredith, J., "The evolution of the intellectual structure of operations management-1980-2006: A citation/co-citation analysis", Journal of Operations Management, (27:3), 2009, pp 185-202. Pointcheval, D., and Stern, J., "Security arguments for digital signatures and blind signatures", Journal of Cryptology, (13:3), 2000, pp 361–396. Posthumus, S., and Solms, R. v., "A framework for the governance of information security", Computers & Security, (23:8), 2004, pp 638-646. Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N., The Ghost In The Browser Analysis of Web-based Malware, 2007 Qi, B., Fung, C.-H. F., Lo, H.-K., and Ma, X., "Time-shift attack in practical quantum cryptosystems", Quantum Information & Computation, (7:1-2), 2007, pp 73-82. Rachedi, A., Benslimane, A., Otrok, H., Mohammed, N., and Debbabi, M., "A Secure Mechanism Design-Based and Game Theoretical Model for MANETs", Mobile Networks & Applications, (15:2), 2010, pp 191-204. Ramos-Rodriguez, A.-R., and Ruiz-Navarro, J., "Changes in the intellectual structure of strategic management research: a bibliometric study of the Strategic Management Journal, 1980-2000", Strategic Management Journal, (25:10), 2004, pp 981-1004. Rex Kelly Rainer, J., Snyder, C. A., and Carr, H. H., "Risk analysis for information technology", Journal of Management Information Systems, (8:1), 1991, pp 129-147. Richardson, R., 2010 / 2011 CSI Computer Crime and Security Survey, 2011 Rivest, R. L., Shamir, A., and Adleman, L., "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, (21:2), 1978, pp 120-126. Saint-Germain, R., "Information security management best practice based on ISO/IEC 17799", The Information Management Journal, (39:4), 2005, pp 60 - 66. Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lutkenhaus, N., and Peev, M., "The security of practical quantum key distribution", Reviews of Modern Physics, (81:3), 2009, pp 1301-1350. Schultz, E. E., Proctor, R. W., Lien, M.-C., and Salvendy, G., "Usability and Security An Appraisal of Usability Issues in Information Security Methods", Computer & Security, (20:7), 2001, pp 620-634. Shamir, A., "How to share a secret", Communications of the ACM, (22:11), 1979, pp 612-613. Shannon, C., "Communication theory of secrecy systems", Bell Systems Technical Journal, (28), 1949, pp 656-715. Small, H., "Co citation in the scientific literature: A new measure of the relationship between two documents", Journal of the American society for information science, (24:4), 1973, pp 265-269. Small, H., and Griffith, B., "The structure of scientific literatures I: Identifying and graphing specialties", Science studies, (4), 1974, pp 17-40. Solms, R. v., "Information security management: The second generation", Computers & Security, (15:4), 1996, pp 281-288. Spafford, E. H., "The internet worm program: an analysis", ACM SIGCOMM Computer Communication Review, (19:1), 1989, pp 17-57. Takesue, H., Nam, S. W., Zhang, Q., Hadfield, R. H., Honjo, T., Tamaki, K., and Yamamoto, Y., "Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors", Nature Photon, (1), 2007, pp 343-348. Tight, M., "Higher education research as tribe, territory and/or community: a co-citation analysis", Higher Education, (55:5), 2008, pp 593-605. Tsay, M., Xu, H., and Wu, C., "Journal co-citation analysis of semiconductor literature", Scientometrics, (57:1), 2003, pp 7-25. Wang, C., Deng, F. G., and Long, G. L., "Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state", Optics Communications, (253:1–3), 2005, pp 15-20. Wegman, M. N., and Carter, J. L., "New hash functions and their use in authentication and set equality", Journal of Computer and System Sciences, (22:3), 1981, pp 265-279. White, H., "Author cocitation analysis and Pearson''s r", Journal of the American Society for Information Science and Technology, (54:13), 2003, pp 1250-1259. White, H. D., and McCain, K. W., "Visualizing a discipline: An author co-citation analysis of information science, 1972-1995", Journal of the American Society for Information Science, (49:4), 1998, pp 327-355. Wootters, W. K., and Zurek, W. H., "A single quantum cannot be cloned", Nature, (299), 1982, pp 802 - 803. Wright, M., "Third Generation Risk Management Practices", Computer Fraud & Security, (1999:4), 1999, pp 9-12. Xu, F., Chen, W., Wang, S., Yin, Z., Zhang, Y., Liu, Y., Zhou, Z., Zhao, Y., Li, H., Liu, D., Han, Z., and Guo, G., "Field experiment on a robust hierarchical metropolitan quantum cryptography network", Chinese Science Bulletin, (54:17), 2009, pp 2991-2997. Yang, D., and Wu, J., "Review and prospect of relationship marketing: A citation analysis", Contemporary Management Research, (3:3), 2007, pp 267-284. Young, R., Zhang, L., and Prybutok, V. R., "Hacking into the Minds of Hackers", Information Systems Management, (24:4), 2007, pp 281-287. Zazali, H. H., and Othman, W. A. M., "Key Exchange in Elliptic Curve Cryptography Based on the Decomposition Problem", Sains Malaysiana, (41:7), 2012, pp 907-910. Zou, C. C., Towsley, D., Gong, W., and Cai, S., "Advanced routing worm and its security challenges", Simulation-Transactions of the Society for Modeling and Simulation International, (82:1), 2006, pp 75-85.
|