| 期刊論文1. | Pfohl, H. C.、Gomm, M.(2009)。Supply chain finance: optimizing financial flows in supply chains。Logistics Research,1(3/4),149-161。 | 2. | Koblitz, Neal、Menezes, Alfred、Vanstone, Scott A.(2000)。The state of elliptic curve cryptography。Designs, Codes and Cryptography,9(2/3),173-193。 | 3. | Wuttke, D. A.、Blome, C.、Henke, M.(2013)。Focusing the financial flow of supply chains: An empirical investigation of financial supply chain management。International Journal of Production Economics,145(2),773-789。 | 4. | Alese, Boniface K.、Philemon, E. D.、Falaki, Samuel O.(2012)。Comparative analysis of Public-Key encryption schemes。International Journal of Engineering and Technology,2(9),1552-1568。 | 5. | Basu, P.、Nair, S. K.(2012)。Supply chain finance enabled early pay: Unlocking trapped value in B2B logistics。International Journal of Logistics Systems and Management,12(3),334-353。 | 6. | Camerinelli, E.(2009)。Supply chain finance。Journal of Payments Strategy & Systems,3(2),114-128。 | 7. | Gomm, M. L.(2010)。Supply chain finance: Applying finance theory to supply chain management to enhance finance in supply chains。International Journal of Logistics Research and Applications,13(2),133-142。 | 8. | Ivashina, Victoria、Scharfstein, David(2010)。Bank lending during the financial crisis of 2008。Journal of Financial Economics,97(3),319-338。 | 9. | Phillip, K.(2010)。The necessity for supply chain finance。Credit Control,31(1),39-44。 | 10. | Kumar, Arun、Tyagi, S. S.、Rana, Manisha、Aggarwal, Neha、Bhadana, Pawan(2011)。A comparative study of public key cryptosystem based on ECC and RSA。International Journal on Computer Science and Engineering,3(5),1904-1909。 | 11. | Kute, V. B.、Paradhi, P. R.、Bamnote, G. R.(2009)。A software comparison of RSA & ECC。International Journal of Computer Science and Applications,2(1),61-65。 | 12. | Lauter, K.(2004)。The advantages of elliptic curve cryptography for wireless security。IEEE Wireless Communications,11(1),62-67。 | 13. | Lenstra, Arjen K.、Verheul, Eric R.(2001)。Selecting cryptographic key sizes。Journal of Cryptology,14(4),255-293。 | 14. | Liu, Z.、Cruz, J. M.(2012)。Supply chain networks with corporate financial risks and trade credits under economic uncertainty。International Journal of Production Economics,137(1),55-67。 | 15. | Menezes, Alfred J.、Vanstone, Scott A.(1993)。Elliptic curve cryptosystems and their implementation。Journal of Cryptology,6(4),209-224。 | 16. | Mailov, A.、Abbasov, H.、Isayev, R.、Safarov, A.(2015)。Study and implementation of elliptic curve encryption algorithm for azerbaijan E-ID card。International Journal of Innovative Research in Computer and Communication Engineering,3(5),3708-3713。 | 17. | Polak, P.、Sirpal, R.、Hamdan, M.(2012)。Post-Crisis emerging role of the treasurer。European Journal of Scientific Research,86(3),319-339。 | 18. | Samta, G.、Sanjeev, K.、Monisha, S.、Sanjay, S.、MK, K.(2012)。Application of elliptic curve method in cryptography: A Literature Review。International Journal of Computer Science and Information Technologies,3(3),4499-4503。 | 19. | Shaikh, R.、Deotale, D.(2015)。A survey on VANET security using ECC, RSA & MD5。International Journal of Advanced Research in Compute and Communication Engineering,4(6),167-172。 | 20. | Sinha, R.、Srivastava, H. K.、Gupta, S.(2013)。Performance based comparison study of RSA and elliptic curve cryptography。International Journal of Scientific & Engineering Research,4(5),720-725。 | 21. | Tahat, Nedal(2014)。A new signing algorithm based on elliptic curve discrete logarithms and quadratic residue problems。Italian Journal of Pure and Applied Mathematics,32(1),125-132。 | 22. | Tsai, Chien-Hua、Su, Pin-Chang(2015)。Multi-Document threshold signcryption scheme。Security and Communication Network,8(13),2244-2256。 | 23. | Udo-Akang, D.(2014)。Cyber perspectives: Internet exploitation and business survivability。International Journal of Business, Humanities and Technology,4(2),15-27。 | 24. | Koblitz, Neal(1987)。Elliptic Curve Cryptosystems。Mathematics of Computation,48(177),203-209。 | 25. | Mentzer, John T.、DeWitt, William、Keebler, James S.、Min, Soonhong、Nix, Nancy W.、Smith, Carlo D.、Zacharia, Zach G.(2001)。Defining Supply Chain Management。Journal of Business Logistics,22(2),1-25。 | 會議論文1. | Malig, A. A.(2012)。An outsider's look at information security management in libraries, museums, and archives (LMAs)。The 5th Rizal Library International Conference on Libraries, Archives and Museums: Common Challenges, Unique Approaches。Quezon City:Ateneo de Manila University。 | 圖書1. | Hankerson, Darrel、Menezes, Alfred、Vanstone, Scott(2004)。Guide to Elliptic Curve Cryptography。New York:Springer-Verlag。 | 2. | Adams, Carlisle、Lloyd, Steve(2002)。Understanding PKI: Concepts, Standards, and Deployment Considerations。Addison-Wesley Publishing Company。 | 3. | The National Security Agency Central Security Service(2009)。The case for elliptic curve cryptography。San Francisco, California:NSA/CSS。 | 4. | Advisen Insurance Intelligence(2013)。Managing cyber supply chain risks。New York:Adivisen。 | 5. | ASYX Early Payment Solution(2015)。Supply chain finance platform。Serpong Tangerang:ASYX。 | 6. | Bank for International Settlements(2014)。Committee on payments and market infrastructures: Cyber resilience in financial market infrastructures。Bank for International Settlements。 | 7. | Business Innovation Observatory(2014)。Innovative business models: Supply chain finance。Brussels:European Commission。 | 8. | CERT-UK(2015)。Cyber-Security risks in the supply chain。CERT-UK。 | 9. | China Systems(2015)。Supply chain finance and factoring。Moorgate, London:China Systems。 | 10. | Citigroup Inc.(2015)。Treasury and trade solutions-Supply chain finance. Long Island City。New York:Citigroup Inc.。 | 11. | HIS(2012)。Supply chain risk 2.0: Understanding supplier networks and supply connections。Morganville, NJ:HIS。 | 12. | ING(2015)。Working capital solutions: Supply chain finance。MG, Amsterdam:ING。 | 13. | Lamoureux, J. F.、Evans, T. A.(2011)。Supply chain finance: A new means to support the competitiveness and resilience of global value chains。Rochester, NY:Social Science Research Network。 | 14. | Vacca, J. R.(2004)。Public key infrastructure: Building trusted applications and web services。Boca Raton, Florida:Taylor & Francis Group。 | 其他1. | Drab, D.(2003)。Economic espionage and trade secret theft: Defending against the pickpockets of the New Millennium,https://www.xerox.com/downloads/wpaper/x/xgs_business_insight_economic_espionage.pdf。 | 2. | Jansma, N.,Arrendondo, B.(2004)。Performance comparison of elliptic curve and RSA digital signatures,http://www.nicj.net/files/performance_comparison_of_elliptic_curve_and_rsa_digital_signatures.pdf。 | 3. | Hurtrez, N.,Salvadori, M. G.(2010)。Supply chain finance: From myth to reality,file:///C:/Users/Latitude%207275/Downloads/mop9_supply_chain_finance.pdf。 | 4. | NYSE Euronext,The Receivables Exchange(2015)。The receivables exchange,http://starvestpartners.com/receivables-exchange/。 | 5. | Beck, T.,Demirgüç-Kunt, A.,Martinez Peria, M. S.(2008)。Policy research working paper: Bank financing for SMEs around the world: Drivers, Obstacles, Business Models, and Lending Practices,https://elibrary.worldbank.org/doi/abs/10.1596/1813-9450-4785。 | 圖書論文1. | Miller, Victor S.(1986)。Use of elliptic curves in cryptography。CRYPTO 1985: Advances in Cryptology--CRYPTO' 85 Proceedings。Springer-Verlag。 | |