[1]陳瀅、王慶波、金涬、趙陽、何樂、鄒志樂、吳玉會、楊林(2010),雲端策略,天下雜誌股份有限公司,臺北。
[2]鄧瑋敦譯,日經BP出版局(2010),雲端運算大解密,城邦文化事業股份有限公司,臺北。
[3]賴溪松、韓亮、張真誠(1998),近代密碼學及其應用,松崗出版社,臺北。
[4]賴溪松、葉育斌(2004),資訊安全入門,全華科技圖書股份有限公司,臺北。
[5]顏春煌(2005),行動與無線通訊,金和資訊股份有限公司,臺北
[6]江政哲(2010),雲端運算軟體即服務之使用者研究-以Google為例,碩士論文,國立臺灣師範大學圖書資訊學研究所,臺北。[7]李浩維(2009),雲端運算與服務的研究與應用以「GoogleAppEngine」為例,碩士論文,嶺東科技大學數位媒體設計研究所,臺中。[8]張莉庭(2006),兼具安全與效率的電子彩劵系統,碩士論文,世新大學資訊管理系,臺北。[9]陳怡璇(2005),具匿名且安全性之電子彩劵系統,碩士論文,世新大學資訊管理系,臺北。[10]楊家福(2006),具匿名性及安全性之B2C電子發票系統,碩士論文,中央大學資訊管理所,桃園。[11]戴言同(2011),歐盟資訊與通訊技術政策與規範之研究-檢視我國雲端政策之問題,碩士論文,雲林科技大學科技法律研究所,雲林。[12]N. L. Clarke, S. M. Furnell, P. M. Rodwell and P.L. Reynolds(2002), “Acceptance of Subscriber Authentication Methods for Mobile Telephony Devices,” Computers & Security, Vol. 21, No. 3, pp. 220-228.
[13]E. Gallery and C. J. Mitchell(2007), “Trusted Mobile Platforms,” Foundations of Security Analysis and Design IV, pp. 282-323.
[14]S. Grosche和H. Knospe (2002), “Secure Mobile Commerce,” Journal of Electronics and Communication Engineering, Vol. 14, No. 5, pp. 228-238.
[15]M. Hansen, A. Schwartz and A. Cooper(2008), “Privacy and Identity Management,” IEEE Security & Privacy, Vol. 6, No. 2, pp. 38-45.
[16]D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong(2011), “Secure Data Processing Framework for Mobile Cloud Computing,” Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, pp. 614-618.
[17]D. Huang, X. Zhang M. Kang and J. Luo(2010), “MobiCloud: Building Secure Cloud Framework for Mobile Computing And Communication,” Proceedings of the IEEE International Symposium on Service Oriented System Engineering, Nanjing, pp. 27-34.
[18]S. H. Hung, C. S. Shih, J. P. Shieh, C. P. Lee and Y. H. Huang(2012), “Executing Mobile Applications on the Cloud: Framework and Issues,” Computers & Mathematics with Applications, Vol. 63, No.2, pp. 573-587.
[19]M. T. Khorshed, A. B. M. Shawkat Ali and S. A. Wasimi(2012), “A Survey on Gaps, Threat Remediation Challenges And Some Thoughts for Proactive Attack Detection in Cloud Computing,” Future Generation Computer Systems, Vol. 28, No. 6, pp. 833-851.
[20]A. Klein, C. Mannweiler, J. Schneider and H.D. Schotten(2010), “Access Schemes for Mobile Cloud Computing,” Proceedings of the 2010 Eleventh International Conference on Mobile Data Management (MDM), Kansas City, pp. 387-392.
[21]Y. T. Larosa, J. L. Chen, D. J. Deng and H. C. Chao(2011), “Mobile Cloud Computing Service Based on Heterogeneous Wireless and Mobile P2P networks,” Proceedings of the 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, pp. 661-665
[22]J. Lee and D. Hong(2011), “Pervasive Forensic Analysis Based on Mobile Cloud Computing,” Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security (MINES), Shanghai, pp. 572-576.
[23]J. Li, Bo Li, T. Wo, C. Hu, J. Huai, L. Liu and K. P. Lam(2012), “CyberGuarder: A Virtualization Security Assurance Architecture for Green Cloud Computing,” Future Generation Computer Systems, Vol. 28, No. 2, pp. 379-390.
[24]J. S. Lee and C. C. Chang(2009), “Design of electronic t-out-of-n lotteries on the Internet,” Computer Standards & Interfaces, Vol. 31, No. 2.pp. 395-400.
[25]I. E. Liao, C. C. Lee and M. S. Hwang(2006), “A Password Authentication Scheme Over Insecure Networks,” Journal of Computer and System Sciences, Vol. 72, No. 4, pp. 727-740.
[26]Q. Liu, G. Wang and J. Wu(2012), “Secure and Privacy Preserving Keyword Searching for Cloud Storage Services,” Journal of Network and Computer Applications, Vol. 35, No. 3, pp. 927-933.
[27]F. Lombardi and R. Di Pietro(2011), “Secure virtualization for cloud computing,” Journal of Network and Computer Applications, Vol. 34, No. 4, pp. 1113-1122.
[28]H. Mao, N. Xiao, W. Shi and Y. Lu(2011), “Wukong: A cloud-Oriented File Service for Mobile Internet Devices,” Journal of Parallel and Distributed Computing, Vol. 71, No. 2, pp. 171-184.
[29]P. Mell and T. Grance(2011), The NIST Definition of Cloud Computing, National Institute of Standards and Technology.
[30]J. Molina, H. Lee, S. Lee and Z. Song(2006), “A Mobile Trusted Platform Module (mTPM) Architecture,” Proceedings of the 2006 2nd Workshop on Advance in Trusted Computing(WATC), Japan.
[31]I. Muttik and C. Barton(2009), “Cloud Security Technologies,” Information Security Technical Report, Vol. 14, No. 1, pp. 1-6.
[32]S. Paquette, P. T. Jaeger and S. C. Wilson(2010) “Identifying the Security Risks Associated with Governmental Use of Cloud Computing,” Government Information Quarterly, Vol. 27, No. 3, pp. 245-253.
[33]Sherman S.M. Chow *, Lucas C.K. Hui, S.M. Yiu and K.P. Chow(2006), “Practical electronic lotteries with offline TTP,” Computer Communications, Vol. 29, No. 15, pp. 2830-2840.
[34]K. Siau, and Z. Shen(2003), “Building Customer Trust in Mobile Commerce,” Communication of the ACM, Vol. 46, No. 4, pp. 91-94.
[35]S. Subashini and V. Kavitha(2011), “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, Vol. 34, No. 1, pp. 1-11.
[36]D. Svantesson and R. Clarke(2010), “Privacy and Consumer Risks in Cloud Computing,” Computer Law & Security Review, Vol. 26, No. 4, pp. 391-397.
[37]E.I. Tatli and S. Lucks(2009), “Mobile Identity Management Revisited,” Electronic Notes in Theoretical Computer Science, Vol. 244, pp. 125-137.
[38]D. Teneyuca(2011), “Internet Cloud Security: The Illusion of Inclusion,” Information Security Technical Report, Vol. 16, No. 3-4, pp. 102-107.
[39]P. Wilson(2011), “Positive Perspectives on Cloud Security,” Information Security Technical Report, Vol. 16, No. 3-4, pp. 97-101.
[40]D. Zissis and D. Lekkas(2012), “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, Vol. 28, No. 3, pp. 583-592.
[41]Forrester Research
http://www.forrester.com/rb/research
[42]科技產業資訊室-台灣雲端運算產業聯盟
http://cdnet.stpi.org.tw/techroom/analysis/2010/pat_10_A013.htm
[43]科技產業資訊室:2011年平板機銷售量達6,360萬台
http://cdnet.stpi.org.tw/techroom/market/eecomputer/2011/eecomputer_11_048.htm
[44]資策會MIC:4成企業認為無雲端服務需求
http://www.moneydj.com/kmdj/news/newsviewer.aspx?a=7ce4a6c9-6f31-4aa5-84b1-43bfd304c124
[45]資策會MIC:2016年全球智慧型手機破14億台,中低價為主力
http://money.chinatimes.com/news/news-content.aspx?id=20111007002103
[46]從IDC調查報告看Cloud Computing 2010
http://www.dotblogs.com.tw/nel/archive/2010/05/31/15514.aspx
[47]調查:43%企業發生雲端資安問題
http://eportfolio.lib.ksu.edu.tw/~T094000175/blog?date=&node=000000020
[48]Gartner:今年全球行動應用程式世上規模超過150億美元
http://www.ithome.com.tw/itadm/article.php?c=65735
[49]Gartner:預測2012年消費行動應用是十大趨勢
http://www.bnext.com.tw/focus/view/cid/103/id/17384
[50]Gartner:2011年第一季全球手機銷售量達4.28億支
http://www.bnext.com.tw/focus/view/cid/103/id/18528
[51]Gartner:2013年9成聯網裝置導入個人雲
http://tw.stock.yahoo.com/news_content/url/d/a/120315/2/31xnu.html
[52]中華電信 Hami+ 個人雲正式啟動,本土派的雲端空間服務
http://www.techbang.com/posts/8831-chunghwa-telecom-hami-personal-cloud
[53]2010行動應用程式市場年度分析
http://techorange.com/2011/01/10/2010%E8%A1%8C%E5%8B%95%E6%87%89%E7%94%A8%E7%A8%8B%E5%BC%8F%E5%B8%82%E5%A0%B4%E5%B9%B4%E5%BA%A6%E5%88%86%E6%9E%90/
[54]平板、雲端、App:三年內成企業市場主要戰地
http://www.ctimes.com.tw/News/ShowNews.asp?O=HJVB2AJ3EUYSAV0MCW
[55]22.5%企業2013年過半應用程式上雲端
http://www.ithome.com.tw/itadm/article.php?c=72361
[56]電子發票愈來愈多,4種對獎方式怎麼用看這裡
http://www.techbang.com/posts/8589-electronic-invoices-for-what
[57]雲端運算-維基百科
http://zh.wikipedia.org/wiki/%E9%9B%B2%E7%AB%AF%E9%81%8B%E7%AE%97