| 期刊論文1. | Bennett, R. A.(2001)。I didn't do it。USBanker。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Wu, T. C.、Chang, C. C.(1991)。A password authentication scheme based on discrete logarithms。International Journal of Computer Mathematics,41(3/4),31-38。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Wu, Tzong-chen、Wu, Tzong-sun(19940100)。Id-Based Remote Login Authentication Scheme Based on Cross Product Operations。資訊管理與工程學報,1(2),7-13。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Chang, C. C.、Wu, T. C.(1997)。A smart card oriented password authentication scheme based on Rabin's public key cryptosystem。International Journal of Information and Management Sciences,8(3),63-73。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Chang, C. C.、Wu, T. C.(1991)。Remote password authentication with smart cards。IEE Proceedings E: Computers and Digital Techniques,138(3),165-168。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Chang, C. C.、Wu, T. C.、Laih, C. S.(1995)。Cryptanalysis of a password authentication scheme using quadratic residues。Computer Communications,18(1),45-47。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Ammenheuser, M.(2002)。The business case for biometrics。Bank Systems & Technology。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Neuman, B. C.、Ts'o, T.(1994)。Kerberos: An Authentication Service for Computer Networks。IEEE Communications,32(9),33-38。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Kwon, T.、Song, J.(1999)。Secure agreement scheme for gxy via password authentication。Electronics Letters,35(11),892-893。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Lennon, R. E.、Matyas, S. M.、Meyer, C. H.(1981)。Cryptographic authentication of time-invariant quantities。IEEE Transactions on Communications,COM-29(6),773-777。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Kwon, T.、Song, J.(1998)。Efficient and secure password-based authentication protocols against guessing attacks。Computer Communications,21(9),853-861。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | 張真誠、吳玲華(19900600)。A New Password Authentication Scheme。Journal of Information Science and Engineering,6(2),139-147。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 13. | Lin, C. H.、Chang, C. C.、Wu, T. C.、Lee, R. C. T.(1991)。Password authentication using newton's interpolation polynomials。Information Systems,16(1),97-102。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 14. | Chang, C. C.、Hwang, S. J.(1993)。Using smart cards to authenticate remote passwords。Computers and Mathematics with Applications,26(7),19-27。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 15. | Lamport, L.(1981)。Password Authentication with Insecure Communication。Communications of the ACM,24(11),770-772。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Fumy, W.、Pfau, A.(1989)。On the complexity of asymmetric smart card authentication。Second International Smart Card 2000 Conferenece。Amsterdam。181-190。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Shamir, A.(1985)。Identity-based cryptosystems and signature schemes。CRYPTO '84,47-53。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Boyko, V.、MacKenzie, P.、Patel, S.(2000)。Provably secure password authenticated key exchange using Diffie。EUROCRYPT 2000,156-171。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Jablon, D.(1997)。Extended password key exchange protocols immune to dictionary attack。WETICE Workshop on Enterprise Security。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Wu, T.(1998)。Secure remote password protocol。1998 Internet Society Network and Distributed System Security Symposium。San Diego, CA。97-111。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Kwon, T.(2001)。Authentication and key agreement via memorable passwords。NDSS 2001 Symposium。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Halevi, S.、Krawczyk, H.(1998)。Public-key cryptography and password protocols。5th ACM Conference on Computer and Communications Security,122-131。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Harn, L.、Huang, D.、Laih, C. S.(1989)。Password authentication based on public-key distribution cryptosystem。Fifth International Conference on Data Engineering。Los Angeles。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Hwang, T. Y.(1983)。Passwords authentication using public-key encryption。1983 IEEE International Carnahan Conference on Security Technology。Zurich。35-38。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Bellovin, S.、Merritt, M.(1993)。Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise。1st ACM Conference on Computer and Communications Security,244-250。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Ho, D.(20020124)。Identity theft is top consumer fraud complaint of 2001,http://www.msidenaplesxom/02/01/business/d741589a.htm, 。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | 孫承武(2001)。北市警方偵破駭客入侵網路銀行盜領一百餘萬,http://leaddniexom.tw/leadtime/news/security/北市警方偵破駭客入侵網路銀行盜領一百餘萬(Yahoo-2001.05.02).mht。 延伸查詢![new window](/gs32/images/newin.png) | 3. | 張慧雯(2001)。騙取語音密碼一連三起,http://ec.chinatimesxom.tw/scripts/chinatimes/iscstext.exe?DB=ChinaTimes&Function=ListDoc&From=5&Single=l。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | (1996)。Information technology--Open Systems Interconnection--Security frameworks for open systems: Authentication framework(ISO/IEC 10181-2)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Information technology--Security techniques--Entity authentication--Part 5: Mechanisms using zero-knowledge techniques(ISO/IEC 9798-5:2009)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | (2002)。提款機盜錄密碼八銀行失金,http://www.cts.com.tw/news/headlines/news20020410N3.htm。 延伸查詢![new window](/gs32/images/newin.png) | 7. | (1997)。Information technology--Open Systems Interconnection--The Directory: Authentication framework(ISO/IEC 9594-8)。(ITU-T Rec. X.509)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Paul, F.(20001027)。Microsoft computer network hacked; FBI steps in,http://news.cnet.com/news/0-1003-200-3308084.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Kohl, J.,Neuman, C.(1993)。The Kerberos Network Authentication Service (V5),http://www.ietf.org/rfc/rfc1510.txt,(RFC1510)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Phoenix Technologies Ltd。Zero-Knowledge Password Proofs,http://www.integritvsciences.com/password.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Beilare, M.,Rogaway, P.。The AuthA protocol for password-based authenticated key exchange,IEEE P1363 study group for Future PKC Standards。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | MacKenzie, P.,Swaminathan, R.(1999)。Secure network authentication with password information(IEEE P1363a)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |