其他1. | 林祝興、李正隆(2001)。Elliptic-curveundeniablesignatureschemes。 延伸查詢 |
2. | 曹偉駿、陳宗保及何健豪(2002)。行動電子商務環境下安全機制之硏究。 延伸查詢 |
3. | Caelli W.,E. Dawson, and S. Rea(1999)。PKI, Elliptic curve cryptography and digital signatures。 |
4. | Camenisch J., J. Piveteau, and M. Stadler(1994)。Blind signatures based on the discrete logarithm problem。 |
5. | Chaum D.(1982)。Blind signature for untraceable payments。 |
6. | Jurisic A. and A. J. Menezes。ECC whitepapers: elliptic curves and cryptography。 |
7. | Miller V. S.(1986)。Use of elliptic curves in cryptography。 |
8. | Nyberg K. and R. A. Rueppel(1993)。A new signature scheme based on the DSA giving message recovery。 |
9. | Vanstone S.(1997)。Elliptic curve cryptosystem - the answer to strong, fast public-key cryptography for securing constrained environments。 |
10. | Zhang F.,Li Q. and Wang Y.(2000)。A new secure electronic auction scheme。 |