| 期刊論文1. | 柯耀程(20030600)。「證據保全」立法之檢討--評刑事訴訟法新增修證據保全規定。月旦法學,97,141-155。 延伸查詢 | 2. | 張學海(2002)。「當事人進行主義」法務部vs司法院。OPEN雜誌,29。 延伸查詢 | 3. | Hsu, Chien-Lung、Wu, Tzong-Sun、Wu, Tzong-Chen(2003)。Improvement of threshold proxy signature scheme。Applied Mathematics and Computation,136,315-321。 | 4. | Hiraishi, Hironori、Mizoguchi, Fumio(2004)。A Cellular Telephone-Based Application for Skin-Grading to Support Cosmetic Sales。AI Magazine,3(25),17-26。 | 5. | Horng-Twu, L.(2004)。A Secure and General Electronic Voting Protocol。Computer & Security,23(2),107-119。 | 6. | Landsbergen, D. Jr.、Wolken, George Jr.(2001)。Realizing the Promise: Government Information Systems and the Fourth Generation of Information Technology。Public Administration Review,61(2),206-220。 | 7. | Li, Li-Hua、Tzeng, Shiang-Feng、Hwang, Min-Shiang(2003)。Generalization of proxy signature-based on discrete logarithms。Computer & Security,22(3),245-255。 | 8. | Xue, Qingshui、Cao, Zhenfu(2005)。Factoring based proxy signature schemes。Journal of Computational and applied mathematics。 | 9. | 張紘炬、戴忠淵(2001)。An Inventory Model for Deteriorating Items with Partial Backlogging and Permissible Delay in Payments。International Journal of Systems Science,32(3),345-352。 | 10. | Williams, R.、Cothrel, J.(2000)。Four smart ways to run online community。Sloan Management Review,41(4),81-91。 | 11. | Rigby, D. K.、Buchanan, W. T.(1994)。Putting More Strategy into Strategic Alliances。Directors & boards,18(2),14-19。 | 12. | Berners-Lee, Tim、Hendler, James、Lassila, Ora(2001)。The semantic web。Scientific American,284(5),29-43。 | 13. | Kakabadse, Andrew、Kakabadse, Nada K.、Kouzmin, Alexanders(2003)。Reinventing the Democratic Governance Project through Information Technology? A Growing Agenda for Debate。Public Administration Review,63(1),44-60。 | 14. | 林鈺雄(200304)。鳥瞰二〇〇三年一月刑事訴訟之修法。臺灣本土法學雜誌,45,241。 延伸查詢 | 15. | 陳運財(20030900)。刑事訴訟制度之改革及其課題。月旦法學,100,73-90。 延伸查詢 | 16. | Strader, Troy J.、Lin, Fu-Ren、Shaw, Michael J.(1998)。Information infrastructure for electronic virtual organization management。Decision Support Systems,23(1),75-94。 | 17. | Romm, Celia、Pliskin, Nava、Clarke, Rodney(1997)。Virtual Communities and Society: Toward an Integrative Three Phase Model。International Journal of Information Management,17(4),261-270。 | 會議論文1. | Li, Cheng Ju(2004)。Mobile Healthcare Service System Using RFID。2004 IEEE International Conference on Networking, Sensing & Control,1014-1019。 | 2. | Kray, Christan、Kortuem, Gerd(2004)。Interactive Positioning Based on Object Visibility。Mobile Human-Computer Interaction-Mobile HCI,276-287。 | 3. | Chaum, David(1983)。Blind Signatures for Untracable Payments。Crypto'82。New York:Plenum Press。199-203。 | 4. | Fraser, J.(2003)。Knowledge Management Applied to E-government Services: The Use of an Ontology。KMGov 2003,116-126。 | 5. | Kim, Jongweon、Kim, Kyutae、Choi, Jonguk(2004)。Technologies for Online Issuing Service of Documents. Springer Berlin/Heidelberg。Web Information Systems WISE 2004。 | 6. | Tollmar, K.、Yeh, T.、Darrell, T.(2004)。IDeixis-Searching the Web with Mobile Images for Location-Based Information。Human-Computer Interaction-Mobile HCI,288-299。 | 7. | Kavadias, G.、Tambouris, E.(2003)。GovML: A Markup Language for Describing Public Services and Life Events。4th IFIP International Working Conference, KMGov 2003。Rhodes, Greece。 | 8. | Klischewski, R.(2003)。Semantic Web for E-Government。EGOV 2003,288-295。 | 9. | Kaihara, Marcelo E.、Takagi, Naofumi(2003)。VLSI Algorithm for Modular Multiplication/Division。16th IEEE Symposium on Computer Arithmetic,16,220-227。 | 10. | Chang, Ming-Hsin、Lin, Tzu-Shin、Yeh, Yi-Shung(2003)。Forward Secure Proxy Signature Scheme。National Computer Symposium,1381-1387。 | 11. | Odej Kao, U.、Rerrer, G.、Steinert, S.(2004)。Face Recognition Using MMS-Mobile Devices。The International Conference on Wireless Networks,644-650。 | 12. | De, Pradip、Basu, Kalyan、Das, Sajal K.(2004)。An RFID Based Technique for Handling Object Distribution and Recalls in Pervasive Transaction Environments。IEEE International Conference on Mobile Ad-hoc and Sensor Systems,349-358。 | 13. | Sangwan, Raghvinder S.、Qiu, Robin G.(2005)。Using RFID Tags for Tracking Patients, Charts and Medical Equipment within an Integrated Health Delivery Network。IEEE 2005,1070-1074。 | 14. | Stojanovic, L.(2004)。On Managing Changes in the ontology-based E-Government。OTM Confederated International Conferences. CoopIS, DOA, and ODBASE 2004。Agia Napa, Cyprus。 | 15. | Tambouris, E.(2004)。Ontology-Enabled E-Gov Service Configuration: An Overview of the OntoGov Project。KMGov 2004,122-127。 | 16. | Wimmer, A. Maria(2001)。European Development towards Online one-stop Government: The “Egov” Project。The ICE2001 Conference。Vienna, Austria。 | 學位論文1. | 吳佻穎(2011)。B2C電子商店之相關法律問題探討--以消費者保護與電子市集競爭秩序為中心(碩士論文)。銘傳大學。 延伸查詢 | 2. | 宋鴻杰(2001)。快速反應系統--以我國聚酯加工絲業之應用為例(碩士論文)。元智大學。 延伸查詢 | 3. | 周琮智(2005)。電子化政府下各機關公文電子交換成效之個案研究(碩士論文)。世新大學。 延伸查詢 | 4. | 許宣儀(2011)。我國電子票據制度相關法律問題之研究(碩士論文)。東吳大學。 延伸查詢 | 5. | 郭怡宏(2002)。全球物流條碼標準系統(EAN/UCC)內容及其發展應用(碩士論文)。國立交通大學。 延伸查詢 | 6. | 陳思翰(2003)。大學申請入學網路線上報名系統的設計與建置(碩士論文)。國立中正大學。 延伸查詢 | 7. | 陳富益(2003)。我國現行[公文電子交換]政策實施情況之探討--以臺中市政府及所屬機關為例(碩士論文)。東海大學。 延伸查詢 | 8. | 劉玉中(1998)。證據保全之功能及定位之探討--從醫療過誤及該訴訟之相關觀點出發(碩士論文)。國立中興大學。 延伸查詢 | 9. | 鄧敬中(2000)。AutoCAD系統內1/1000數值地形圖檔資料檢核自動化之探討(碩士論文)。國立成功大學。 延伸查詢 | 10. | Chang, Ming-Hsin(2005)。On proxy signatures with forward-secure and one-time properties and their application in PKI(博士論文)。National Chiao-Tung University。 | 11. | 李昭彥(2002)。大陸公證文書在臺採認之理論與實務研究--由國際公證文書採認制度觀點的理論探討(碩士論文)。國立中山大學。 延伸查詢 | 12. | 錢世傑(2011)。數位證據訴訟法制--以費用分配之法律經濟分析為中心(博士論文)。國立中正大學。 延伸查詢 | 圖書1. | Kaufman, Charlie、Perlman, Radia、Speciner, Mike(2002)。Network security, Private Communication in a Public World。Prentice Hall。 | 2. | Heinrich, Claus(2005)。RFID and beyond: Growing your business through real world awareness。IN:Wiley。 | 3. | Davidow, W. H.、Malone, M. S.(1993)。The Virtual Corporation: Structuring and Revitalizing the Corporation for the 21st Centry。Harperbusiness。 | 4. | Biham, Eli、Chen, Rafi(2004)。Near-Collisions of SHA-0. Advances in Cryptology-Crypto' 2004。Springer-Verlag。 | 5. | Bhuptani, Manish、Moradpour, Shahram(2005)。RFID Field Guide:Deploying Radio Frequency Identification Systems。IN:Prentice Hall Professional Technical Reference。 | 6. | Hankerson, Darrel、Menezes, Alfred、Vanstone, Scott(2004)。Guide to Elliptic Curve Cryptography。New York:Springer-Verlag。 | 7. | Drucker, P.(2002)。Managing in the Next Society: Beyond the Information Revolution。New York:Truman Talley Books:ST. Martin's Press。 | 8. | Nielsen, Jacob(2000)。Designing Web Usability: The Practice of Simplicity。Indianapolis, Indiana:New Riders。 | 圖書論文1. | Harrison, Mark、McFarlane, Duncan、Parlikad, Ajith Kumar、Wong, Chien Yaw(2004)。Information management in the product lifecycle-The role of networked RFID。IEEE, Auto ID Labs, Institute for Manufacturing。UK:University of Cambridge。 | 2. | Porter, M. E.、Fuller, M. B.(1986)。Coalitions and global strategies。Competition in Global Industries。Boston, MA:Harvard Business School Press。 | |