|
[1]L. M. Applegate, etc., “Electronic Commerce: Building Blocks of New Business Opportunity,” Journal of Organizational Computing and Electronic Commerce, vol. 6, no. 1, 1996, pp. 1-10. [2]C. R. Baker, “An Analysis of Fraud on the Internet,” Internet Research: Electronic Networking Applications and Policy, vol. 9, no. 5, 1999, pp. 348-359. [3]M. K. Franklin and M. K. Reiter, Verifiable Signature Sharing, Advances in Cryptology: Proceedings of Eurocypto 95, Springer-Verlag, 1995, pp. 50-63. [4]M. K. Franklin and M. K. Reiter, “The Design and Implementation of a Secure Auction Service,” IEEE Transactions on Software Engineering, vol. 22, May, 1996, pp. 302-312. [5]M. K. Franklin and M. K. Reiter, Fair Exchange with a Semi-Trusted Third Party. In Proceedings of the fourth ACM Conference on Computer and Communications Security, 1997, pp. 1-6. Zurich, Switzerland: ACM Press. [6]S.M. Furnell and T. Karweni, “Security Implications of Electronic Commerce: a Survey of Consumers and Businesses,” Internet Research: Electronic Networking Applications and Policy, vol. 9, no. 5, 1999, pp. 372-382. [7]G. Y. Liao and J. J. Hwang, “A Fair and Privacy-Preserved Protocol for Sealed-Bid Auctions,” Proceedings of International Conference on Electronic Commerce, ICEC2000, 2000, pp. 171-176. [8]G. Y. Liao and J. J. Hwang, “A Trustworthy Internet Auction Model With Verifiable Fairness,” Internet Research: Electronic Networking Applications and Policy, vol. 11, no. 2, 2001, pp. 159-166. [9]G. Y. Liao and J. J. Hwang, “A Fair and Privacy-Preserved Protocol for Sealed-Bid Auctions,” Electronic Markets: the International Journal of Electronic Commerce & Business Media, vol. , no. , 2001. (to appear) [10]ISO/IEC JTC1/SC6. 1995. Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, International Standard, ISO/IEC 9594-8. [11]M. Kudo, “Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A, January, 1998, pp. 20-27. [12]eMartketer, “eAuctions Bid Up Online Revenue,” Oct. 2000, http://www.emarketer.com/estats/dailyestats/b2c/20001016_auctions.html. [13]National Association of Consumer Agency Administrators and Consumer Federation of America, Eighth Annual NACAA/CFA Consumer Complaint Survey Report, 1999, http://www.nacaanet.org/survey99.htm. [14]H. Nurmi, “Cryptographic Protocols for Auctions and Bargaining,” in Karhumaki, J., Maurer, H. and Rozenberg, G. (Ed.), Proceedings of Results and Trends in Theoretical Computer Science, Springer-Verlag, Berlin, 1994, pp. 317-324. [15]Organisation for Economic Co-operation and Development, “E-Commerce: Impacts and Policy Challenges,” OECD Economic Outlook, Iss. 67, 2000, pp.193-213. [16]P. Ratnasingham, “The Importance of Trust in Electronic Commerce,” Internet Research: Electronic Networking Applications and Policy, vol. 8, no. 4, 1998, pp. 313-321. [17]F. J. Riggins and H. S. Rhee, “Toward a Unified View of Electronic Commerce,” Communications of the ACM, vol. 41, no. 10, 1998, pp. 88-95. [18]K. Sako, “An Auction Protocol Which Hides Bids of Losers”, in Imai, H. and Zheng, Y. (Ed.), Proceedings of the third International Workshop on Practice and Theory in Public Key Cryptosystems, Springer-Verlag, Melbourne, 2000, pp. 422-432. [19] A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, November, 1979, pp. 612-613. [20] Visa and MasterCard, Secure Electronic Transaction Specification: Book 1: Business Description, version 1.0, 1997, http://www.setco.org/download/set_bk1.pdf. [21]R. T. Wigand, “Electronic Commerce: Definition, Theory, and Context,” The Information Society, vol, 13, 1997, pp. 1-6. [22]V. Zwass, “Electronic Commerce: Structures and Issues,” International Journal of Electronic Commerce, vol. 1, no. 1, 1996, pp. 3-23. [23]行政院公共工程委員會, 政府採購法令彙編, 行政院公共工程委員會,台北,民國八十八年。 [24]廖耕億,黃景彰, “網路競標研究的現況與展望,” 資訊安全通訊, 第五卷第二期,民國八十八年三月。
|