[1]D. Chaum, “Blind signature for untraceable payments,” In: Proceedings of advances in Cryptology, Springer-Verlag, New York, pp.199-203, 1983.
[2]W. S. Juang and H. T. Liaw, “A practical anonymous multi-authority e-cash scheme,” Applied Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, 2004.
[3]Y. Y. Chen, J. K. Jan, and C. L. Chen, “A novel proxy deposit protocol for e-cash systems,” Applied Mathematics and Computation, Vol. 163, No. 2, pp. 869-877, 2005.
[4]C. L. Chen and M. H. Liu, “A traceable E-cash transfer system against blackmail via subliminal channel,” Electronic Commerce Research and Applications, Vol. 8, No. 6, pp. 327-333, 2009.
[5]C. C. Chang and Y. P. Lai, “A flexible Date-attachment Scheme on E-cash,” Computers & Security, Vol. 22, No. 2, pp.160-166, 2003.
[6]W. S. Juang, “D-cash: A flexible pre-paid e-cash scheme for date-attachment,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 74-80, 2007.
[7]R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signature and public key cryptosystem,” Communication of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[8]R. Rivest, “The MD5 message digest algorithm,” RFC 1321, 1992.
[9]NIST FIPS PUB 180, “Secure hash standard,” National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993.
[10]W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003.
[11]H. Krawczyk and T. Rabin, “Chameleon signatures,” Symposium on Network and Distributed Systems Security (NDSS'' 00), pp.143-154, 2000.
[12]A. Shamir and Y. Tauman, “Improved online / offline signature schemes,” Advances in Cryptology-CRYPTO’01, LNCS 2139, pp. 355-367, 2001.
[13]F. Y. Yang, S. H. Chiu, and C. M. Liao, “Trapdoor hash functions with efficient online computations,” The Proceedings of Multimedia and Networking Systems Conference 2006 (MNSC 2006), 2006.
[14]F. Y. Yang, “Efficient trapdoor hash function for digital signatures,” Chaoyang Journal, Vol. 12, pp. 351- 357, 2007.
[15]F. Y. Yang, “Improvement on a trapdoor hash function,” International Journal of Network Security, Vol. 9, No. 1, July, pp. 17-21, 2009.
[16]T. Okamoto, M. Tada, and A. Miyaji, “Efficient ‘on the fly’ signature schemes based on integer factoring,” Proceedings of the 2nd International Conference on Cryptology in India, INDOCRYPT'' 01, LNCS 2247, pp. 275-286, 2001.
[17]G. Poupard and J. Stern, “On the fly signatures based on factoring,” Proceedings of the 6th ACM Conference on computer and communications security (CCS), pp. 48-57, 1999.
[18]D. Pointcheval, “The composite discrete logarithm and secure authentication,” Public-Key Cryptography 2000 (PKC), LNCS 1751, pp. 113-128, 2000.
[19]J.C. Pailles, C. Gaber, V. Alimi, and M. Pasquet, “Payment and privacy: A key for the development of NFC mobile,” International Symposium on Collaborative Technologies and Systems, pp. 378-385, 2010.
[20]M. Pasquet, J. Reynaud, and C. Rosenberger, “Secure payment with NFC mobile phone in the SmartTouch project,” International Symposium on Collaborative Technologies and Systems, pp.121-126, 2008.
[21]J. Ondrus and Y. Pigneur, “An assessment of NFC future mobile payment systems,” International Conference on the Management of Mobile Business, pp.43-49, 2007.
[22]M. Massoth and T. Bingel, “Performance of different mobile payment service concepts compared with a NFC-based solution,” Fourth International Conference on Internet and Web Applications and Services, pp.205-210, 2009.
[23]楊伏夷, 劉鎮瑋, “行動銀行付費系統與電子支票系統之研究,” 朝陽科技大學碩士論文, 2010.[24]楊伏夷, 江承軒, “離線電子錢包系統應用於智慧型行動裝置,” 朝陽科技大學碩士論文, 2011.