| 期刊論文1. | Lamport, L.(1981)。Password Authentication with Insecure Communication。Communications of the ACM,24(11),770-772。 | 2. | Claessens, J.、Dem, V.、Cock, D.、Preneel, B.、Vandewalle, J.(2002)。On the security of today's online electronic banking systems。Computers & Security,21(3),257-269。 | 3. | Clarke, N.L.、Furnell, S.M.(2005)。Authentication of users on mobile telephones: A survey of attitudes and practices。Computers & Security,24(7),519-527。 | 4. | Fuglerud, K.、Dale, O.(2011)。Secure and inclusive authentication with a talking mobile one-time-password client。IEEE Security & Privacy,9(2),27-34。 | 5. | Hanacek, P.、Malinka, K.、Schafer, J.(2010)。e-Banking security - A comparative study。IEEE A&E Systems Magazine,25(1),29-34。 | 6. | Oppliger, R.、Rytz, R.、Holderegger, T.(2009)。Internet banking: Client-side attacks and protection mechanisms。Computer,42(6),27-33。 | 7. | Weir, C. S.、Douglas, G.、Carruthers, M.、Jack, M.(2009)。User perceptions of security, convenience and usability for ebanking authentication tokens。Computers & Security,47-62。 | 會議論文1. | Aloul, F.、Zahidi, S.、El-Hajj, W.(2009)。Two factor authentication using mobile phones。Rabat, Morocco。641-644。 | 2. | Alzomai, M.、Alfayyadh, B.、Josang, A.(2010)。Display security for online transactions: SMS-based authentication scheme。London, UK。1-7。 | 3. | Li, Y.、Li, X.、Zhong, L.、Jing, Y.(2010)。Research on the S/KEY one-time password authentication system and its application in banking and financial systems。Seoul, Korea。172-175。 | 圖書1. | Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms, and Source Code in C。Applied Cryptography: Protocols, Algorithms, and Source Code in C。New York, NY:John Wiley & Sons。 | 2. | RSA Laboratories(2009)。PKCS #11 V2.3: Cryptographic token interface standard。 | 其他1. | 李嘉銘(2007)。網路交易用一次性密碼產生及應用方法及執行該方法之系統。 延伸查詢 | 2. | 金融監督管理委員會(2008)。金融機構辦理電子銀行業務安全控管作業基準。 延伸查詢 | 3. | 財政部(1998)。金融機構辦理電子銀行業務安全控管作業基準。 延伸查詢 | 4. | International Telecommunication Union(2010)。The world in 2010。 | 5. | ISO/IEC JTC 1(1996)。Information technology - Open systems interconnection - Security frameworks for open systems: Authentication framework。 | 6. | National Institute of Standards and Technology(2011)。Cryptographic hash algorithm competition。 | |