[1] A. Tsalgatidou and E. Pitoura, “Business Models and Transactions in Mobile Electronic Commerce: Requirements and Properties”, Computer Networks, 2001, pp.221-236.
[2] B. R. Lee, T. Y. Kim, S. S. Kang, “Ticket Based Authentication and Payment Protocol for Mobile Telecommunications Systems”, Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing, 2001, pp.218-221.
[3] D.Brown, “Techniques for Privacy and Authentication in Personal
Communication Systems” , IEEE Personal Communications, Vol. 2, No. 4, 1995, pp. 6-10.
[4] G.Horn, and B. Preneel, “Authentication and Payment in Future Mobile
Systems,” Journal of Computer Security, Vol. 8, 2000, pp. 183-207.
[5] H. Y. Lin, and L. Harn, “Authentication Protocols for Personal Communication Systems,” Proceedings of the Conference on Applications, Technologies, Architectures,and Protocols for Computer Communication, Cambridge, Massachusetts, United States, 1995, pp. 256-261.
[6] J.Zhou, and D.Gollmann, “A fair non-repudiation protocol”, Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, California, 1996, pp. 55—61.
[7] J.Helin, “Implementing and Capitalizing on DRM Structures for Mobile Content”, IIR’s 5th Mobile Data & Internet Services Summit, 2002.
[8] K.Enoki, “i-mode: The Mobile Internet Service of the 21st Century,” Proceedingsof the IEEE International Solid-State Circuits Conference on Digest of Technical Papers,San Francisco, CA, United States, 2001, pp. 12-15.
[9] K. Naruse, “Findings of the Mobile-Users Survey,” ECOM Journal, No.2, 2002.
[10] K. Fujimura and Y.Nakajima, “General-Purpose Digital Ticket Framework”, Proceedings of the 3rd USENIX Workshop on Electronic Commerce, 1998, pp.177-186.
[11] K. Fujimura, H.Kuno, M. Terada, K. Matsuyama, Y. Mizuno, J. Sekine, “Digital-Ticket-Controlled Digital Ticket Circulation” Proceedings of the 8th USENIX Security Symposium, Washington, United States, 1999, pp.229-238.
[12] L.Buttyan, and J.Hubaux, “Accountable Anonymous Access to Services in Mobile Communication Systems,” Proceedings of the 18th IEEE Symposium on ReliableDistributed Systems, Lausanne, Switzerland, 1999, pp. 384-389.
[13] N. E. Fishway, M. Nofal, and A. Tadros, “An Effective Approach for
Authentication of Mobile Users,” Proceedings of the 55th Vehicular Technology
Conference, Birmingham, UK, Vol. 2, 2002, pp. 598-601.
[14] N. Zhang and Q. Shi, “Security Issues in an EDI Environment”, IEEE Computer Security Applications Conference, 1996, pp.129-136.
[15] S. Grosche, S.Grosche, and H. Knospe, “Secure Mobile Commerce”, Electronics & Communication Engineering Journal, 2002, pp.228-238.
[16] W.Curtis, and L. Sinton, “Securing the Global, Remote, Mobile User,”
International Journal of Network Management, Vol. 9, No. 1, 1999, pp. 9-21.
[17] W.Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE
Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
[18] Y. Y Chen, J. K Jan, C. L. Chen, “A fair and secure mobile billing system”, unpublished manuseript, 2003.
[19] Y. Y Chen, J. K Jan, C. L. Chen, “Design of a mobile ticket system based on portable device”, unpublished manuseript, 2003.
[20] Mobile electronic Transactions Ltd., “MeT White Paper on Mobile Ticketing”, Jan.2003.
[21] Mobile electronic Transactions Ltd., “The present ticketing white paper complements MeT Release 2”, Jan.2003.
[22] Mobile electronic Transactions Ltd., “MeT Ticketing Framework V1.0”, Discussion Document, Feb.2001.
[23] MySQL Connector/J Documentation
URL: http://dev.mysql.com/doc/connector/j/en/index.html
[24] Specification of the Bluetooth system - part A (Core) and part B (Profiles), v1.0B01-12-1999.
[25] Sun Microsystems, Inc., “White Paper: MIDP APIs forWireless Applications”, Oct.2001.
[26] Phone Scoop ,“smartphone definition”.
URL: http://www.phonescoop.com/glossary/term.php?gid=131
[27] GSM Association.
URL: http://www.gsmworld.com/roaming/gsminfo/index.shtml
[28] MeT Core Specification, MeT Version 1.2.
URL: http://www.mobiletransaction.org/
[29] Nokia, Inc.
URL: http://www.nokia.com/
[30] Sun Microsystems, Inc.
URL: http://java.sun.com
[31] 中華民國棒球協會.
URL: http://www.ctba.org.tw/index.asp
[32] 資策會電子商務應用推廣中心, “產業電子化指標與標準研究”, 2003年.
[33] 曾幼蘭, “影響行動電話使用者選擇行動上網服務相關因素之探討”, 國立台灣科技大學管理研究所碩士論文, 2002年.[34] 陳星白, “行動票券交易之研究”,朝陽科技大學資訊管理所碩士論文, 2003年.
[35] 拓璞產業研究所, “智慧型行動電話定義及未來趨勢”, 2003年11月.
[36] 微型爪哇人, “認識Java行動電話”, 學貫行銷, 2003年3月.
[37] 賴士奇, “全球行動商務產業趨勢與市場分析”, e-Business, 2001年, pp.7-14.
[38] 米川英樹, “J2ME MIDP行動電話遊戲程式設計”, 博碩文化, 2003年2月.
[39] 沈汝康, 「資訊、電信業 聯手管帳有一套」, 自由時報, 2002年10月.
[40] E. R. Harold, “Java網路程式設計”, O’REILLY, 2000年6月.
[41] J. Knudsen, “Java密碼學”, O’REILLY, 1999年3月.
[42] V. Harte, “GSM Superphones”, McGraw-Hill, pp.44-55.