參考文獻 |
參考文獻
中文參考文獻
1. 台灣大哥大Catch小額付款,http://www.tcc.net.tw
2. 台灣國際電子商務中心,“EC 研究報告,解析PayPal 的成功模式”,2002年一月。
3. 中華電信行動生活—一摸就迷,http://www.emome.net/cgi-bin/MASP/jsp/ emomeWeb/index.jsp
4. 中華電信行動生活—839小額付款,http://www.emome.net/cgi-bin/MASP/jsp/ emomeWeb/index.jsp?uri_id=538331611&com.broadvision.session.new=Yes
5. 白順濤,紅進福,李超良,“行動資訊商場之認證與資訊傳遞”,電信研究雙月刊,第127到136頁,2004年四月。
6. 交通部電信總局電信相關統計資料,http://www.dgt.gov.tw/chinese/ Data-statistics/data-statistics.shtml#data-2
7. 東方線上專業生活型態與消費市場研究顧問,http://www.isurvey.com.tw
8. 林祝興,王保利,“一個適用於無線網路環境的安全通道之建立”,東海科學,第81到93頁,2001年七月。
9. 許巍瀚:行動付款機制之分析,國立臺灣大學資訊管理研究所碩士論文,民國92 年9 月。
10. 陳佳賢,“全球Mobile Payment 發展現況”,電子商務,第12到24頁,2002年九月。
11. 陳佳賢,“我國Mobile Payment 發展現況”,電子商務,第13到22頁,2003年二月。
12. 黃維中,“Micro Payment及Mobile Payment之探討及實作”,電腦與通訊,第47到51頁,2000年十二月。
13. 遠傳電信i-Style小額付款,http://www.istyle.com.tw
14. 劉昌龍,“SET 網路安全電子交易”,Internet Pioneer, 1998, P.89-94。
15. 魏志強,“行動商務應用研究報告—行動付款發展解析”,網路資訊,第94到98頁,2004年三月。
英文參考文獻
16. Antovski, Ljupco and Marjan Gusev, “M-Payments,” 25th Int. Conf. Information Technology Interfaces ITI, 2003, P.95-100.
17. Blumenthal, Uri, and etal., “A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks,” Bell Labs Technical Journal, 2002, P.37-48.
18. Clarke, Matthew, “M-Payment Technology Will Drive Spending,” Electricnews.net, 2003.
19. Fiat, A. and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Proc. CRYPTO ’86, Lecture Notes in Computer Science, Spring Verlag, 1985, P.186-194.
20. Horn, G., and Preneel B., “Authentication and Payment in Future Mobile Systems,” Journal of Computer Security, 2000, P.183-207.
21. Hu, Zhi-Yuan, Yao-Wei Liu, Xiao Hu and Jian-Hua Li, “Anonymous Micropayments Authentication (AMA) in Mobile Data Network,” IEEE INFOCOM, ISBN 0-7803-8356-7, 2004.
22. Humin, Gao, Wang Changjie and Wang Yumin, “A Secure Electronic Payment Protocol Based on Bank Account”, International Conference on Info-tech & Info-net Proceedings, 2001, P.30-34.
23. Kohl, J.T., “The Evolution of the Kerberos Authentication Service,” Eruopen Conference Proceedings, 1991, pp.295-313.
24. Kumar, Kuldeep and Jos Van Hillegersberg, “New Architectures for Financial Services,” Communication of The ACM, 2004, P.27-30.
25. Kungoisdan, Supakorn, Bala Srinivasan and Phu Dung Le, “Accountability Logic for Mobile Payment Protocols,” ITCC, 2004, P.40-44.
26. Kungoisdan, Supakorn, Bala Srinivasan and Phu Dung Le, “A Secure Account-based Mobile Payment Protocol,” International Conference on Information Technology, Volume 15, Number 8, October 1997, P.1608-1617.
27. Lee, C. C., L. H. Li, and M. S. Hwang, “A User Authentication Scheme Using Hash Functions,” ACM Operating System Review, vol. 36, no. 4,2002 ,P. 23-29.
28. Mallat, Nilna, Matti Rossi and Virpi Kristiina Tuunainen, “Mobile Banking Services,” Communications of the ACM, 2004, P.42-46.
29. Me, G., “Payment Security in Mobile Environment,” ACS/IEEE International Conference on Computer Systems and Applications, 2003.
30. Mobile Payment Forum, “Risk and Threats Analysis and Security Best Practices-Mobile 2-Way Messaging Systems,” Mobile Payment Forum, 2003, http://www.mobilepaymentforum.org/.
31. Mobile Payment Forum, “Mobile Payment Forum White Paper – Enabling Secure, Interoperable and User-friendly Mobile Payments,” Mobile Payment Forum, 2002, http://www.mobilepaymentforum.org/.
32. Peha, Jon M. and Ildar M. Khamitov, “PayCash: A Secure Efficient Internet Payment System,” Electronic Commerce Research and Applications Journal, 2004, P.381-388.
33. Ravi, S., CCRL, A. Raghunathan, CCRL, N.R. Potlapally, CCRL and M. Sankaradass, CCRL, “System Design Methodologies for a Wireless Security Processing Platform,” Proceedings 2002 Design Automation Conference, 2002, P.777-782.
34. Roos, A., Hartman, M. and Dutnall, S., “Critical Issues for Roaming in 3G,” Wireless Communications, 2003, P.29-35.
35. Salvi, Arun Bhati and Swati Shai, “Dial M for Money,” WMC’02, 2002, P.95-99
36. Schwiderski, Grosche S. and H. Knospe, “Secure mobile commerce,” Electronic & Communication Engineering Journal, 2002.
37. Secker, Mathew, “M-Payment—An Open Book: Globally Agreed M-Payment Standates are a Long Way Off But Do We Need Them Anyway,” Telecommunications, 2002.
38. Suzuki, Shigefusa and Kazuhiko Nakada, “ An Authentication Technique Based on Distributed Security Management for the Global Mobility Network,” IEEE Journal on Selected Areas in Communications, ISBN 0733-8716, 1997.
39. Tracz, R., and Wrona, K., “Fair Electronic Cash Withdrawal and Change Return for Wireless Networks,” Proceedings of the First International Workshop on Mobile Commerce, 2001, P.14-19.
40. Varshney, Upkar, “Mobile Payments,” Wireless Communications, 2002, P.120-121.
41. Varshney, Upkar, “Location Management for Mobile Commerce Applications in WirelessInternet,” ACM Transactions on Internet Technologies, 2003, P.236-255.
42. Varshney, Upkar and Ron Vetter, “Mobile commerce: framework, applications and networking support, ” Mobile Networks and Applications, 2002, P.185-198
43. Vorapranee, Khu-smith and Chris J. Mitchell, “Using GSM to Enhance E-Commerce Security,” WMC’02, 2002, P.75-81.
44. Wei, Qiang, and Hinny Kong Pe Hin, "Agent-Based System for Mobile Commerce," Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'02) IEEE Computer Society, 2002.
45. Zheng, Xiaolin and Deren Chen, “Study of Mobile Payments System,” IEEE International Conference on E-Commerce(CEC’03), 2003. |