[1].Ameen Ahmad, Roger Chandler, Abhay A. Dharmadhikari, Uttam Sengupta, "SIM based WLAN authentications for open platforms", Technology at Intel Magazine, August 2003
[2].Khalid Al-Tawil, Ali Akrami, "A new authentication protocol for roaming users in GSM networks", Proceedings IEEE International Symposium on Computers and Communications, pp.93 – 99, July 1999
[3].Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, "Wireless Hotspots: Current Challenges and Future Directions", Mobile Networks and Applications, Volume 10, Issue 3, pp. 265-274, June 2005
[4].M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest, "Proxy-based Security Protocols in Networked Mobile Devices", Proceedings of the 2002 ACM Symposium of Applied computing, pp. 265-272, 2002
[5].D. Chaum, "Blind Signature for untraceable payment", Proceeding of Advances in Cryptology-Cypto''82 , pp. 199-203, 1982
[6].Raphael C.-W. Phan, "Security Limitations of an Authorized Anonymous ID-Based Scheme for Mobile Communication", IEEE Communication Magazine, Volume 43, Issue 5, pp. 149-153, May 2005
[7].Ronald Cramer, Victor Shouper, "Signature schemes based on the strong RSA assumption", ACM Transactions on Information and System Security., Volume 3 , Issue 3 , pp. 161 - 185 , August 2000
[8].Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, "A Fair and Secure Mobile Billing System", Computer Networks, Volume 48, Issue 4, pp. 517-524, 15 July 2005
[9].Taher ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Volume31, Issue 4, pp. 469-472, July 1985
[10].Constantioins F. Grecas, Sotirios I. Maniatis, Iadovos S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Volume 8, Issue 2, pp. 145-150, April 2003
[11].Michael G. Reed, Paul F. Syverson, David M. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Journal on Selected Areas in Communications, Volume 16, Issue 4, pp. 482-494, May 1998
[12].L. Harm, Y. Xu, "Design of generalized ElGamal type signature based on discrete logarithm", Electronics Letters , Volume 30, Issue 24, pp. 2025-2026, 24 Nov 1994
[13].Thomas F Johnston, "Security issues in a satellite global GSM network", Information Security Technical Report, Volume 4, Issue 1, pp. 42-52, 1999
[14].Charlie Kaufman, Radia Perlman, Mike Speciner, "Network Security: Private Communication in a Public World", 2nd ed., Prentice-Hall Series In Computer Networking And Distributed Systems archive, pp. 504, 1995
[15].H. Krawxzyk, M. Bellare, R. Canetti, "HMAC: keyed-hashing for Message Authentication," IETF REC 2104, Feb. 1997
[16].Byung-Gil Lee, Hyun-gon Kim, Sung-Won Sohn, Kil-Houm Park, "Concatenated wireless roaming security association and authentication protocol using ID-based cryptography", The 57th IEEE Semiannual, Vehicular Technology Conference, Volume 3, pp. 1507 - 1511, April 2003
[17].Hung-Yu Lin, "Security and authentication in PCS", Computers & Electrical Engineering, Volume 25, Issue 4, pp. 225-248, July 1999
[18].Yi-Bing Lin, Yuan-Kai Chen, "Reducing authentication signaling traffic in third-generation mobile network", IEEE Transactions. Wireless Communications, Volume 2, Issue 3, pp. 493-501, May 2003
[19].Asha Mehrotra, Leonard S. Golding, "Mobility and security management in the GSM system and some proposed future improvements", Proceedings of the IEEE, Volume 86, Issue 7, pp. 1480-1497, July 1998
[20].Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant, "Authentication, Authorization and Accounting (AAA) in Hybrid Ad hoc Hotspot’s Environments", Proceedings of the 4th ACM international workshop on Wireless mobile applications and service on WLAN hotspots, pp. 37-46, 2006
[21].Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz, "Secure Authentication System for Public WLAN Roaming", Proceedings of the 1st ACM international workgroup on Wireless mobile applications and service on WLAN hotspots”, pp. 113-121, 2003
[22].K. Nyberg, R.A. Rueppel, "Message recovery for signature schemes based on the discrete logarithm problem", EUROCRYPT’94, LNCS 950, Springer-Verlag, pp. 182-193, May 1994
[23].Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan, "A simple mobile communication billing system among charged parties", Applied Mathematics and Computation, Volume 192, Issue 2, pp. 487-495, 15 September 2007
[24].Bhrat Patel, Jon Crowcroft, "Ticket based service access for the mobile user", Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, pp. 223-233, 1997
[25].Zuhua Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards and Interfaces, Volume 26, Issue 5, pp. 449-454, September, 2004
[26].Jack Verhoosel, Roel Stap, Alfons Salden, "A Generic Business Model for WLAN Hotspots – a Roaming Business Case in the Netherlands", Proceeding of the 1st ACM international workshop on Wireless Mobile Applications and Services on WLAN Hotspots archive, pp. 85-92, 2003
[27].Mark Weiser, "Some Computer Science Issues in Ubiquitous computing", ACM SIGMOBILE Mobile Computing and Communications, Volume 3, Issue 3, PP. 12, 1999
[28].Hua Wang, Jinli Cao, Yanchuan Zhang, "Ticket-based service access scheme for mobile users", Proceedings of the twenty-fifth Australasian conference on Computer Science, Volume 4, pp. 285-292, January 2002
[29].Christos Xenakis, Lazaros Merakos, "Security in third Generation Mobile Networks", Computer Communications, Volume 27, Issue 7, pp. 638-650, 1 May 2004
[30].Jianying Zhou, Kwok Lam, "Undeniable billing in mobile communication", Proceedings of the 4th annual ACM/IEEE international conference on mobile computing and networking, pp. 284-290, October 1998
[31].Yanchao Zhang, Yuguang Fang, "A secure authentication and billing architecture for wireless mesh networks", Wireless Networks, Volume 13, Issue 5, pp. 663-678, October 2007
[32].3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001
[33].European Telecommunications Standards Institute (ETSI), "GSM 2.09: Security aspects", June 1993
[34].林建興, 周斌妤, "民眾使用公眾無線區域網路上網行為之研究",國立中山大學公共事務管理研究所碩士論文, 2005[35].英國倫敦;無線網路計劃 ; http://www.cityoflondon.gov.uk/Corporation/media_centre/files2006/wifi.htm
[36].舊金山;無線網路計劃 ; http://www.sfgov.org/site/tech_connect_page.asp?id=38562
[37].加拿大;無線網路計劃 ; http://www.gov.sk.ca/news?newsId=71f283b3-f8f8-44c4-b0d6-693921262e29
[38].安源通訊; WIFLY ; http://www.wifly.com.tw/Wifly6/tw
[39].新加坡政府;Wireless@SG無線網路 ; http://www.ida.gov.sg/home/index.aspx
[40].台北市政府;無線網路新都 ;http://wlan.taipei-elife.net/wlanplan.html
[41].高雄市政府;無線網路共用平台; https://www.kcgwlan.nat.gov.tw/Account/Desktop/Register.aspx
[42].麥當勞速食餐廳; http://www.mcdonalds.com.tw/
[43].美國西雅圖; 無線網路計劃;http://www.seattle.gov/html/citizen/wifi.htm
[44].香港政府;GovWiFi;http://www.gov.hk/tc/theme/wifi/program/index.htm
[45].新加坡政府;Wireless@SG ; http://www.ida.gov.sg/Programmes/20061027174147.aspx?getPagetype=36
[46].淡水;無線幸福城; http://publish.tpc.gov.tw/post/action/2004tamsui_net/page_03.htm
[47].經濟部工業局;無線寬頻網路應用服務;http://www.moeaidb.gov.tw/portal.html
[48].中華電信;WLAN無線上網;http://wlan.hinet.net/
[49].資策會; How Many;http://www.find.org.tw/0105/howmany/index.asp
[50].中國報告大廳;無線費城計劃; http://big5.chinabgao.com/gate/big5/www.chinabgao.com/freereports/19515.htm