[1]R. Halpin and R. Moore, “Developments in electronic money regulation – the Electronic Money Directive: A better deal for e-money issuers,”Computer Law & Security Review, Vol. 25, No. 6, pp. 563-568, 2009.
[2]W. S. Juang and H. T. Liaw, “A practical anonymous multi-authority e-cash scheme,”Applied Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, 2004.
[3]S. Singh, “Electronic money: understanding its use to increase the effectiveness of policy,” Telecommunications Policy, Vol. 23, No. 11, pp. 753-773, 1999.
[4]Y. Y. Chen, J. K. Jan, and C. L. Chen, “A novel proxy deposit protocol for e-cash systems,”Applied Mathematics and Computation, Vol. 163, No. 2, pp. 869-877, 2005.
[5]W. S. Juang, “D-cash: A flexible pre-paid e-cash scheme for date-attachment,”Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 74-80, 2007.
[6]Y. Baseri, B. Takhtaei and J. Mohajeri, “Secure untraceable off-line electronic cash system,” Scientia Iranica, Vol. 20, No. 3, pp. 637-646, 2013.
[7]C. L. Chen and M. H. Liu, “A traceable E-cash transfer system against blackmail via subliminal channel,”Electronic Commerce Research and Applications, Vol. 8, No. 6, pp. 327-333, 2009.
[8]C. C. Chang and Y. P. Lai, “A flexible Date-attachment Scheme on E-cash,”Computers & Security, Vol. 22, No. 2, pp.160-166, 2003.
[9]W. K. Chen, “Efficient on-line electronic checks,”Applied Mathematics and Computation, Vol. 162, No. 3, pp. 1259-1263, 2005.
[10]C. C. Chang, S. C. Chang and J. S. Lee, “An on-line electronic check system with mutual authentication,”Vol. 35, No. 5, pp. 757-763, 2009.
[11]悠遊卡股份有限公司, “悠遊卡介紹, ”website: https://www.easycard.com.tw/easycard/01/way.asp
[12]J. J. Hwang, T. C. Yeh and J. B. Li, “Securing on-line credit card payments without disclosing privacy information,”Computer Standards & Interfaces, Vol. 25, No. 2, pp. 119-129, 2003.
[13]W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003.
[14]J. A. Garay, A. Kiayias and N. Leonardos, “The Bitcoin Backbone Protocol: Analysis and Applications,”Lecture Notes in Computer Science, vol 9057, 2015.
[15]K. Liao, Z. Zhao, A. Doupe, and G. J. Ahn, “Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin,”in 2016 APWG Symposium on Electronic Crime Research (eCrime), 2016, pp. 1-13.
[16]M. Spagnuolo, F. Maggi, and S. Zanero, “Bitiodine: Extracting intelligence from the bitcoin network,”in Financial Cryptography and Data Security, ed: Springer, 2014, pp. 457-468.
[17]Tan, Garry Wei-Han, et al. “NFC mobile credit card: the next frontier of mobile payment?,”Telematics and Informatics 31.2, 2014, pp. 292-307.
[18]Chen, Yalin, and Jue-Sam Chou.“Cryptanalysis on“Secure untraceable off-line electronic cash system”,”IACR Cryptology ePrint Archive 2014 (2014): 63.
[19]Fuw-Yi Yang and Su-Hui Chiu, “A provably secure trapdoor hash function based on k-ECAA,”Asian Journal of Computer and Information Systems (AJCIS), Vol. 4, No. 3, pp. 77-80, June, 2016.
[20]Fuw-Yi Yang, Su-Hui Chiu, and Chih-Wei Hsu, “A Transferable E-Cash Payment System Based on a Profitable Model,”2nd International Workshop on Industrial Engineering (IWIE-2015), Istanbul, Turkey, September 12-13, pp. 179-189, 2015.
[21]F. Y. Yang, S. H. Chiu, and C. M. Liao, “Trapdoor Hash Functions with Efficient Online Computations,” TheProceedings of Multimedia and Networking Systems Conference 2006 (MNSC 2006),2006.
[22]F. Y. Yang, “Efficient trapdoor hash function for digital signatures,” Chaoyang Journal, Vol. 12, pp. 351- 357, 2007.
[23]F. Y. Yang, “Improvement on a trapdoor hash function,” International Journal of Network Security, Vol. 9, No. 1, July, pp. 17-21, 2009.
[24]江承軒, “離線電子錢包系統應用於智慧型行動裝置,”朝陽科技大學碩博士論文, 2011.[25]王建森, “近端通訊之行動付費系統應用於智慧型行動裝置,”朝陽科技大學碩博士論文, 2012.[26]許志維, “雲端可轉讓電子現金付款系統,”朝陽科技大學碩博士論文, 2013.[27]林威廷, “基於信用卡服務之多銀行付費系統,”朝陽科技大學碩博士論文, 2014.