|
參考文獻 [1] D. Chaum, “Blind signature for untraceable payments”, In: Proceedings of advances in Cryptology, Springer-Verlag, New York, pp.199-203, 1983. [2] C. C. Chang and Y. P. Lai, “A flexible Date-attachment Scheme on E-cash”, Computers & Security, Vol. 22, No. 2, pp.160-166, 2003. [3] W. S. Juang, “D-Cash:A Flexible Pre-paid E-cash Scheme for Date-attachment”, Electronic Commerce Research and Applications, Vol. 6, No. 1, pp.74-80, 2007. [4] X. Dai and B. Lo, NetPay – an efficient protocol for micro-payments on the WWW. Fifth Australian World Wide Web Conference, Australia, 1999. [5] U. L. Gelinas and J. L. Gogan, “The FSTC electronic check project”, American Institute of Certified Public Accountants (AICPA) Case Development Program, 1997. [6] M. Anderson, “The Electronic Check Architecture”, Financial Services Technology Consortium, September 1998. [7] D. Chaum, A. Fiat, and M. Naor, “Untraceable electronic cash”, In: Proceedings of advances in Cryptology, California, Vol. 403, pp. 319–327, 1990. [8] D. Chaum, B. D. Boer, and E. V. Heyst, S. Mjolsnes, A. Steenbeek, “Efficient offline electronic check”, In: Proceedings of advances in Cryptology, Vol. 434, pp. 294–301, 1989. [9] W. K. Chen, “Efficient on-line electronic checks”, Applied Mathematics and Computation, Vol. 162, pp. 1259-1263, 25 March 2005. [10] C. C. Chang, S. C. Chang, and J. S. Lee, “An on-line electronic check system with mutual authentication”, Computers & Electrical Engineering, Vol. 35, pp. 757-763, September 2009. [11] R. Rivest, “The MD5 Message Digest Algorithm”, RFC 1321, 1992. [12] NIST FIPS PUB 180, “Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993. [13] W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003. [14] R. Rivest, A. Shamir, and L. Adelman, “A Method for Obtaining Digital Signature and Public Key Cryptosystem”, Communication of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. [15] H. Krawczyk and T. Rabin, “Chameleon signatures”, Symposium on Network and Distributed Systems Security (NDSS’00), pp.143-154, 2000. [16] A. Shamir and Y. Tauman, “Improved online / offline signature schemes”, Advances in Cryptology-CRYPTO’01, LNCS 2139, pp. 355-367, 2001. [17] F. Y. Yang, S. H. Chiu, and C. M. Liao, “Trapdoor Hash Functions with Efficient Online Computations”, The Proceedings of Multimedia and Networking Systems Conference 2006 (MNSC 2006), 2006. [18] F. Y. Yang, “Efficient trapdoor hash function for digital signatures”, Chaoyang Journal, Vol. 12, pp. 351- 357, 2007. [19] F. Y. Yang, “Improvement on a trapdoor hash function”, International Journal of Network Security, Vol. 9, No. 1, July, pp. 17-21, 2009. [20] T. Okamoto, M. Tada, and A. Miyaji, “Efficient ‘on the fly’ signature schemes based on integer factoring”, Proceedings of the 2nd International Conference on Cryptology in India, INDOCRYPT’01, LNCS 2247, pp. 275-286, 2001. [21] G. Poupard and J. Stern, “On the fly signatures based on factoring”, Proceedings of the 6th ACM Conference on computer and communications security (CCS), pp. 48-57, 1999. [22] D. Pointcheval, “The composite discrete logarithm and secure authentication”, Public-Key Cryptography 2000 (PKC), LNCS 1751, pp. 113-128, 2000.
|