1. Boneh, D. ”Twenty years of attacks on the RSA cryptosystem,” Amer. Math. Soc. Notices, Vol. 46, pp. 203-213, 1999.
2. Boneh, D. , Durfee, G. and Frankel, Y. ,“ An attack on RSA given a fraction of the private key bits,” AsiaCrypt'98, Lecture Notes in Computer Science, Springer-Verlag, 1998.
3. Gordon, J., “Strong RSA Key,” Electronics Letters, Vol. 20, pp. 514-516,1984.
4. Kaliski, B. S. and Yin, Y. L., “The Secure Use of RSA,” CryptoBytes, Vol. 1, pp. 7-13. 1995.
5. Wiener, M. J., “Cryptanalysis of Short RSA Secret Exponents,” IEEE Transactions on Information Theory, Vol. 36, pp. 553-558, 1990.
6. The Internet Engineering Task Force, http://www.ietf.org/
7. IETF S/MIME Working Group, “S-MIME Mail Security (smime) Charter”,http://www.ietf.org/html.charters/smime-charter.html
8. The Internet Engineering Task Force,“MIME (Multipurpose Internet Mail Extensions):”, http://www.ietf.org/rfc/rfc1341.txt?number=1341
9. The Internet Engineering Task Force,“S/MIME Version 2 Message Specification”, http://www.ietf.org/rfc/rfc2311.txt?number=2311
10. The Internet Engineering Task Force,“Enhanced Security Services for S/MIME”, http://www.ietf.org/rfc/rfc2634.txt?number=2634
11. Microsoft Corporation(MSDN),“ Microsoft Collaboration Data Objects for Windows 2000 Programmer's Reference”, http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cdo/html/_denali_cdo_for_nts_library.asp
12. RSA Security Inc.,“ RSA Security Developer Resources Standards S-MIME Central ”,
http://www.rsasecurity.com/standards/smime/index.html
13. RSA Security Inc.,“ RSA Laboratories Public Key Cryptography Standards (PKCS)”, http://www.rsasecurity.com/rsalabs/pkcs/index.html
14. RSA Security Inc.,“ RSA BSAFE S/MIME-C 2.0”, http://www.rsasecurity.com/products/bsafe/bsafe.html
15. Gartner, Inc, http://www4.gartner.com/Init
16. SingleSignon.net,“The security of practical two-party RSA signature schemes RSA”,http://www-cse.ucsd.edu/users/mihir/papers/splitkey.html
17. 資策會ECRC-FIND, http://www.find.org.tw/0105/home_new.asp, 民國92年2月
18. 張文旭,“SSL 協定簡介”, 資訊安全通訊第六卷第三期
19. 鄧友清,“無線區域網路的標準發展”, 通訊雜誌九十五期, http://www.cqinc.com.tw/grandsoft/cm/095/afo955.htm,2001
20. 高阜民,“區域網路管理的研究與整合”,中興大學 應用數學研究所碩士論文, 民國81年21. 莊効諺,“無線網路安全解決方案-802.1x在authenticator的實作及改良”, 臺灣大學 資訊工程學研究所碩士論文, 民國92年22. 蔣筱鈺,“台灣KIOSK產業之研究”,臺灣大學 商學研究所碩士論文, 民國90年23. Brian Overland著,戴至中譯,[C++技術參考辭典],博碩文化, 民國91年9月
24. 謝長明,編著,[Exchange 2000 Server探秘與實務管理]文魁資訊,民國90年8月
25. 巫坤品/曾志光,譯[密碼學與網路安全—原理與實務第二版],碁峰資訊,民國90年9月