參考文獻 |
[1] Alexa, “Top Sites,” retrieved from: http://www.alexa.com/topsites, 2012.
[2] ANSI X9.63, “Public key cryptography for the financial service industry – key agreement and key transport using elliptic curve cryptography,” 2001.
[3] Y. Aumann and M. Rabin, “Efficient deniable authentication of long message,” Int. Conf. on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th birthday, retrieved from: http://www.cs.cityu.edu.hk/dept/video. html, 1998.
[4] AppleDaily, “超離譜網售東森購物8千筆個資,” retrieved from: http://tw.nextmedia.com/applenews/article/art_id/31700290/IssueID/20090611, 2009.
[5] J. A. Bargh, K. Y. A. McKenna and G. M. Fitzsimons, “Can you see the real me? activation and expression of the true self on the internet,” Journal of Social Issues, Vol. 58, No. 1, pp. 33-48, 2002.
[6] J. A. Barnes, “Class and committees in a Norwegian island parish,” Human Relation, Vol. 7, No. 1, pp. 39-58, 1954.
[7] L. Berkman and S. L. Syme, “Social networks, host resistance and mortality: a nine-year follow up study of Alameda county residents,” American Journal of Epidemiology, Vol. 109, No. 2, pp. 186-204, 1979.
[8] D. M. Boyd and N. B. Ellison, “Social network sites: definition, history, and scholarship,” Journal of Computer Mediated Communication, Vol. 13, No. 1, pp. 210-230, 2007.
[9] D. T. Campbell and J. C. Stanley, “Experimental and quasi-experimental designs for research,” Boston: Houghton Mifflin Company, 1963.
[10] J. Cassidy, “Me media,” The New Yorker, pp. 50–59, 2006.
[11] CheckFacebook.com, retrieved from: http://www.checkfacebook.com/, 2010.
[12] P. Chiaramonte and E. Martinez, “Jerks in space in the New York post,” 2006.
[13] Y. H. Chuang, W. Shu, K. C. Hsu and C. L. Hsu, “A secure non-interactive deniable authentication protocol based on discrete logarithms,” ICIC Express Letters , PartB: Applications. (In press)
[14] S. Cohen and S. L. Syme, “Social support and health,” New York: Academic Press, 1985.
[15] N. Coppola, S. R. Hiltz and N. Rotter, “Building trust in virtual teams,” IEEE Transactions on Professional Communication, Vol. 47, No. 2, pp. 95-104, 2004.
[16] J. Cummings, B. Butler and R. Kraut, “The quality of online social relationships,” Communication of the ACM, Vol. 45, No. 7, pp. 103-108, 2002.
[17] F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-335, 1989.
[18] X. Deng, C. H. Lee and H. Zhu, “Deniable authentication protocols,” IEE Proceeding of Computer and Digital Techniques, Vol. 148, No. 2, pp. 101-104, 2001.
[19] W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976.
[20] J. Donath and D. Boyd, “Public displays of connection,” BT Technology Journal, Vol. 22, No. 4, pp. 71-82, 2004.
[21] C. Dwork, M. Naor and A. Sahai, “Concurrent zero-knowledge,” Conference Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 409-418, 1998.
[22] C. Dwyer, “Digital relationships in the ’MySpace’ generation: results from a qualitative study,” Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS), Hawaii, 2007.
[23] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, Vol. IT-31, No. 4, pp. 469–472, 1985.
[24] N. Ellison, R. Heino and J. Gibbs, “Managing impressions online: self-presentation processes in the online dating environment,” Journal of Computer-Mediated Communication, Vol. 11, No. 2, pp. 415-441, 2006.
[25] N. Ellison, C. Steinfield and C. Lampe, “The benefits of Facebook ‘friends’: exploring the relationship between college students’ use of online social networks and social capital,” Journal of Computer Mediated Communication, Vol. 12, No. 4, pp. 1143-1168, 2007.
[26] E. Ericksen and V. Yancey, “Class, sector and income determination,” Unpublished Manuscript, Temple University, 1980.
[27] L. Fan, C. X. Xu and J. H. Li, “Deniable authentication protocol based on Diffie-Hellman algorithm,” Electronics Letters, Vol. 38, No. 4, pp. 705-706, 2002.
[28] C. S. Fischer, “To dwell among friends: personal networks in town and city,” Chicago: Chicago University Press, 1982.
[29] M. Fishbein and I. Ajzen, “Beliefs, attitude, intention and behavior: an introduction to theory and research,” MA: Addison-Wesley Publishing Company, 1975.
[30] A. J. Flanging, “IM online: instant messaging use among college students,” Communication Research Reports, Vol. 22, No. 3, pp. 175-187, 2005.
[31] C. Fornell and D. F. Larcker, “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.
[32] F. Fukuyama, “Trust: the social virtues and the creation of prosperity,” Simon & Schuster Inc, New York, 1996.
[33] M. Girault, “Self-certified public key”, Advances in Cryptology – EUROCRYPT’91, pp. 491-497, 1991.
[34] M. Granovetter, “The strength of weak ties,” The American Journal of Sociology, Vol. 78, No. 6, pp. 1360-1380, 1973.
[35] R. Gross and A. Acquisti, “Information revelation and privacy in online social networks,” Workshop on Privacy in the Electronic Society, Alexandria, Virgin, 2005.
[36] J. P. Guilford, “Fundamental statistics in psychology and education (4-ed),” N.Y.: McGraw-Hill, 1965.
[37] M. Hammer, “Core and extended social networks in relation to health and illness,” Social Science and Medicine, Vol. 17, No. 7, pp. 405-411, 1983.
[38] M. T. Hansen, “The search-transfer problem: the role of weak ties in sharing knowledge across organization subunits,” Administrative Science Quarterly, Vol. 44, No. 1, pp. 82-111, 1999.
[39] M. T. Hansen, M. L. Mors and B. LØVÅS, “Knowledge sharing in organizations: multiple networks, multiple phases,” The Academy of Management Journal, Vol. 48, No. 5, pp. 776-793, 2005.
[40] M. Haspels, “Will you be my Facebook friend,” Paper presented at the Proceedings of the 4Th Annual GRASP Symposium, Wichita State University, 2008.
[41] C. Haythornthwaite, “Social networks and internet connectivity effects,” Information, Communication, & Society, Vol. 8, No. 2, pp. 125-147, 2005.
[42] G. C. Homans, “Social behavior as exchange,” The American Journal of Sociology, Vol. 63, No. 6, pp. 597-606, 1958.
[43] C. L. Hsu and T. S. Wu, “Efficient proxy signature schemes using self-certified public keys”, Applied Mathematics and Computation, Vol. 152, No. 3, pp. 807-820, 2004.
[44] H. Huang and Z. Cao, “An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem,” ASIACCS ’09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009.
[45] Institute of Electrical and Electronics Engineers, IEEE P1363 Standard Specifications for Public Key Cryptography, 2000.
[46] ISO/IEC 9594-8, “Information technology – open systems in interconnection – the directory: authentication framework,” International Organization for Standardization, 1995 (equivalent to ITU-t Rec. X. 509, 1993).
[47] ISO/IEC 14888-3, “Information technology – security techniques – digital signature with appendix – part 3: certificate-based mechanisms,” International Organization for Standardization, 1998.
[48] ISO/IEC 11770-3, “Information technology – security techniques – key management – part 3: mechanisms using asymmetric techniques,” 1999.
[49] ISO/IEC 15946-1, “Information technology – security techniques – cryptographic techniques based on elliptic curves – part 1: general,” 2002.
[50] ISO/IEC 15946-2, “Information technology – security techniques – cryptographic techniques based on elliptic curves – part 2: digital signatures,” 2002.
[51] ISO/IEC 15946-3, “Information technology – security techniques – cryptographic techniques based on elliptic curves – part 3: key establishment,” 2002.
[52] S. Jarvenpaa and D. Leidner, “Communication and trust in global virtual teams,” Journal of Computer-Mediated Communication, 1998.
[53] E. A. Jun, J. D. Ji, J. Lim and S. W. Jung, “Improved remote user authentication scheme using bilinear pairings,” ICHIT ’09: Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009.
[54] H. F. Kaiser, “An index of factorial simplicity,” Psychometrika, Vol. 39, No.1, pp. 31-36, 1974.
[55] J. Kar and B. Majhi, “A novel deniable authentication protocol based on Diffie-Hellman algor ithm using pairing technique,” ICCCS ’11: Proceedings of the 2011 International Conference on Communication, Computing & Security, 2011.
[56] F. Karinthy, “Everything is different,” 1929.
[57] J. Kohl and C. Neuman, “The Kerberos authentication service (v5),” Internet RFC 1510, 1993.
[58] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987.
[59] R. Kraut, M. Patterson, V. Lundmark, S. Kiesler, W. Mukopadhyay and W. Sherlis, “Internet paradox: a social technology that reduces social involvement and psychological well-being,” American Psychologist, Vol. 53, No. 9, pp. 1017-1031, 1998.
[60] C. Lampe, N. Ellison and C. Steinfield, “A Facebook in the crowd: social searching vs. social browsing,” Paper presented at the Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, Canada, pp. 167-170, 2006.
[61] R. Larose and M. Eastin, “A social cognitive theory of internet uses and gratifications: toward a new model of media attendance,” Journal of Broadcasting & Electronic Media, Vol. 48, No. 3, pp. 358-377, 2004.
[62] A. Lenhart and M. Madden, “Teens, privacy, & online social networks,” Pew Internet and American Life Project Report, 2007.
[63] J. Leskovec and E. Horvitz, “Planetary-scale views on a large instant-messaging network,” Paper presented at the Proceeding of the 17th International Conference on World Wide Web, Beijing, China, pp. 915-924, 2008.
[64] L. Lessig, “The architecture of privacy,” 1998.
[65] D. Z. Levin and R. Cross, “The strength of weak ties you can trust: the mediating role of trust in effective knowledge transfer,” Management Science, Vol. 50, No. 11, pp. 1477-1490, 2004.
[66] J. D. Lewis and A. Weigert, “Trust as a social reality,” Social Forces, Vol. 63, No. 4, pp. 967-985, 1985.
[67] C. Li and J. Bernoff, “Groundswell,” Cambridge, MA: Harvard Business Press, 2008.
[68] C. Liu, J. Marchewka, J. Lu and C. Yu, “Beyond concern: a privacy-trust-behavioral intention model of electronic commerce,” Information & Management, Vol. 42, No. 1, pp. 127-142, 2004
[69] R. Lu and Z. Cao, “A new deniable authentication protocol from bilinear pairings,” Applied Mathematics and Computation, Vol. 168, No. 2, pp. 954-961, 2005.
[70] R. Lu, X. Lin, Z. Cao, L. Qin and X. Liang, “A simple deniable authentication protocol based on the Diffie-Hellman algorithm,” International Journal of Computer Mathematics, Vol. 22, No. 3, pp. 1-9, 2007.
[71] G. Lowe, “Some new attacks upon security protocols,” 9th IEEE Computer Security Foundations Workshop, IEEE Computer, Society Press, pp.162-169, 1996.
[72] A. Mcafee, “The impact of information technology on businesses and their leaders,” 2007.
[73] K. Y. A. McKenna and A. S. Green, “Virtual group dynamics,” Group Dynamics: Theory, Research, and Practice, Vol. 6, No. 1, pp. 116-127, 2002.
[74] A. J. Menezes, P. C. Oorschot and S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press Inc., 1997.
[75] G. Mesch and I. Talmud, “The quality of online and offline relationships: the role of multiplexity and duration of social relationships,” The Information Society, Vol. 22, No. 3, pp. 137-148, 2006.
[76] S. Milgram, “The small world problem,” Psychology Today, pp. 60-67, 1967.
[77] V. Miller, “Short programs for functions on curve,” retrieved from: http://tcs.uj.edu.pl/~mistar/pdf/Miller1986ShortPrograms.pdf, 1986.
[78] G. Milne and M. Culnan, “Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices,” Journal of Interactive Marketing, Vol. 18, No. 3, pp. 15-29, 2004.
[79] G. E. Moore, “Cramming more components onto integrated circuits,” Electronics, Vol. 38, No. 8, pp. 114-117, 1965.
[80] N. H. Nie and L. Erbing, “Internet and society: a preliminary report,” Paper presented at the CA: Stanford Instituted for the Quantitative Study of Society, 2000.
[81] NIST, “The digital signature standard,” Communications of the ACM, Vol. 35, No. 7, 1992.
[82] NIST, “Digital signature standard”, FIPS Publication 186-2, 2000.
[83] Nownews, “賣個資給壹週刊 熊世芬只是下游 還有規模驚人大盤,” retrieved from: http://www.nownews.com/2008/04/26/10844-2266735.htm, 2008.
[84] J. Owyang, “Teleconference strategy for Facebook, a ready-made marketing platform,” Forester Research, Inc, 2008.
[85] Z. Papacharissi and A. Rubin, “Predictors of internet use,” Journal of Broadcasting & Electronic Media, Vol. 44, No. 2, pp. 175-196, 2000.
[86] M. R. Parks and K. Floyd, “Making friends in cyberspace,” Journal of Communication, Vol. 46, No. 1, pp. 80-97, 1996.
[87] E. Paul and S. Brier, “Friendsickness in the transition to college: precollege predictors and college adjustment correlates,” Journal of Counseling and Development, Vol. 79, No. 1, pp. 77-89, 2001.
[88] C. S. Pereira and A. L. Soares, “Improving the quality of collaboration requirements for information management through social networks analysis,” International Journal of Information Management, Vol. 27, No. 2, pp. 86-103, 2007.
[89] T. A Pierce, “X-posed on Myspace: a content analysis of MySpace social networking sites,” Journal of Media Psychology, Vol. 12 No. 1, 2007.
[90] l. D. S. Pool and M. Kochen, “Contacts and influence,” Social Networks, Vol. 1, pp. 5-51, 1978.
[91] R. D. Putnam, “Bowling alone: the collapse and revival of American community,” 2000.
[92] M. D. Raimondo, R. Gennaro and H. Krawczyk, “Deniable authentication and key exchange,” CCS ’06: Proceedings of the 13th ACM conference on Computer and communications security, 2006.
[93] Q. Ren, Y. Mu and W. Susilo, “Mitigating phishing with ID-based online/offline authentication,” AISC ’08: Proceedings of the sixth Australasian conference on Information security, 2008.
[94] R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public-key cryptosystem,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[95] D. Schoenbachler and G. Gordon, “Trust and consumer willingness to provide information in database-driven relationship marketing,” Journal of interactive marketing, Vol. 16, No. 3, pp. 2-16, 2002.
[96] A. H. Segars, “Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information system research,” Omega, Vol. 25, No. 1, pp. 107-121, 1996.
[97] Z. Shao, “Efficient deniable authentication protocol based on generalized ElGamal signature scheme,” Computer Standards & Interfaces, Vol. 26, No. 5, pp. 449-454, 2004.
[98] Y. Shi and J. Li, “Identity-Based deniable authentication protocol,” Electronics Letters, Vol. 41, No. 5, 2005.
[99] W. G. Shieh and W. B. Horng, “Security analysis and improvement of remote user authentication scheme without using smart cards,” ICIC Express Letters: An International Journal of Research and Surveys, Vol. 4, No. 6, pp. 2431-2436, 2010.
[100] W. G. Shieh and W. B. Horng, “Cryptanalysis and improvement of Wen et al.’s provably secure authentication key exchange protocols for low power computing devices,” ICIC Express Letters: An International Journal of Research and Surveys, Vol. 5, No. 11, pp. 4027-4032, 2011.
[101] W. Shu and Y. H. Chuang, “Why people share knowledge in virtual communities,” Social Behavior and Personality, Vol. 39, No. 5, pp. 671-690, 2011.
[102] W. Shu and Y. H. Chuang, “The perceived benefits of 6-degree-separation social network service,” Internet Research, Vol. 12, No. 1, pp. 26-45, 2011.
[103] L. Sproull and S. Faraj, “Public access to the internet,” 1995.
[104] J. Sundén, “Material virtualities,” Paper presented at the New York: Peter Lang, 2003.
[105] P. Thoits, “Conceptual, methodological and theoretical problems in studying social support as a buffer against life stress,” Journal of Health and Social Behavior, Vol. 23, No. 2, pp. 145-159, 1982.
[106] M. Van der Poel, “Delineating personal support networks,” Social Networks, Vol. 15, No.1, pp. 49-70, 1993.
[107] D. Q. Viet, A. Yamamura and H. Tanaka, “Anonymous password-based authentication key exchange,” Advances in Cryptology-INDOCRYPT’05, pp. 244-257, 2005.
[108] Y. Wang, J. Li and L. Tie, “A simple protocol for deniable authentication based on ElGamal cryptography,” 2005 Wiley Periodicals, Inc. NETWORKS, Vol. 45, No. 4, pp.193-194, 2005.
[109] Wikipeida, “Facebook,” retrieved from: http://zh.wikipedia.org/zh-tw/Facebook, 2010.
[110] Wikipeida, “Diffie–Hellman key exchange,” retrieved from: http://en.wikipedia.org/wiki/Diffie-Hellman-Merkle, 2012.
[111] B. Wellman, “The community question: the intimate networks of east Yorkers,” American Journal of Sociology, Vol. 84, No. 5, pp. 1201-1231, 1979.
[112] B. Wellman, “Computer networks as social networks: collaborative work, telework and virtual community,” Annual Review of Sociology, Vol. 22, pp. 211-238, 1996.
[113] B. Wellman, A. Q. Haase, J. Witte and K. Hampton, “Does the internet increase, decrease, or supplement social capital? social networks, participation, and community commitment,” American Behavioral Scientist, Vol. 45, No. 3, pp. 436-455, 2001.
[114] T. Wills, “Supportive functions of interpersonal relationships,” In Social Support and Health, edited by S. Cohen and S.L. Syme. Orlando: Academic Press, 1985.
[115] S. C. Yang and C. K. Farn, “Social capital, behavioural control, and tacit knowledge sharing — a multi-informant design,” International Journal of Information Management, Vol. 29, No. 3, pp. 210-218, 2009.
[116] E. J. Yoon, W. S. Lee and K. Y. Yoo, “Secure remote user authentication scheme using bilinear pairings,” WISTP’07: Proceedings of the 1st IFIP TC6/WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems, pp. 102-114, 2007.
[117] E. J. Yoon, E. K. Ryu, and K. Y. Yoo, “Improvement of Fan et al.’s deniable authentication protocol based on Diffie-Hellman algorithm,” Applied Mathematics and Computation, Vol. 167, No. 1, pp. 274-280, 2005.
|