| 期刊論文1. | Diffie, W.、Hellman, M. E.(1976)。New Directions in Cryptography。IEEE Transactions on Information Theory,22(6),644-654。 | 2. | Shannon, C. E.(2001)。A mathematical theory of communication。ACM SIGMOBILE Mobile Computing and Communications Review,5(1),3-55。 | 3. | Zhou, Y.、Guo, G.、Li, F.(2020)。Certificateless public key encryption with cryptographic reverse firewalls。Journal of Systems Architecture,109。 | 4. | Zhang, L.、Zhang, H.、Yu, J.、Xian, H.(2020)。Blockchain-based two-party fair contract signing scheme。Information Sciences,535,142-155。 | 5. | Yuan, E.、Wang, L.、Cheng, S.、Ao, N.、Guo, Q.(2020)。A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks。Sensors,20(6)。 | 6. | Ying, B.、Nayak, A.(2019)。Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography。Journal of Network and Computer Applications,131,66-74。 | 7. | Yang, Y.、Chen, F.、Chen, J.、Zhang, Y.、Yung, K. L.(2019)。A secure hash function based on feedback iterative structure。Enterprise Information Systems,13(3),281-302。 | 8. | Xue, Y.、Tan, Y.、Liang, C.、Li, Y.、Zheng, J.、Zhang, Q.(2018)。RootAgency: A digital signature-based root privilege management agency for cloud terminal devices。Information Sciences,444,36-50。 | 9. | Wazid, M.、Das, A. K.、Bhat, V.、Vasilakos, A. V.(2020)。LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment。Journal of Network and Computer Applications,150。 | 10. | Teh, J. S.、Tan, K.、Alawida, M.(2019)。A chaos-based keyed hash function based on fixed point representation。Cluster Computing,22,649-660。 | 11. | Teh, J. S.、Samsudin, A.(2017)。A chaos-based authenticated cipher with associated data。Security and Communication Networks,2017。 | 12. | Sohal, A. S.、Sandhu, R.、Sood, S. K.、Chang, V.(2018)。A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments。Computers & Security,74,340-354。 | 13. | Shahid, F.、Khan, A.(2020)。Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers。Future Generation Computer Systems,111,241-253。 | 14. | Sepahi, R.、Steinfeld, R.、Pieprzyk, J.(2014)。Lattice-based certificateless public-key encryption in the standard model。International Journal of Information Security,13(4),315-333。 | 15. | Rahardja, U.、Sudaryono, S.、Santoso, N. P. L.、Faturahman, A.、Aini, Q.(2020)。Covid-19: Digital Signature Impact on Higher Education Motivation Performance。International Journal of Artificial Intelligence Research,4(1)。 | 16. | Ouyang, M.、Wang, Z.、Li, F.(2021)。Digital signature with cryptographic reverse firewalls。Journal of Systems Architecture,116。 | 17. | Nakhaei, K.、Ansari, F.、Ansari, E. J.(2020)。Signature: eliminating third‑party‑hosted JavaScript infection threats using digital signatures。SN Applied Sciences,2(4)。 | 18. | Mouha, N.、Raunak, M. S.、Kuhn, D. R.、Kacker, R.(2018)。Finding Bugs in Cryptographic Hash Function Implementations。IEEE Transactions on Reliability,67(3),870-884。 | 19. | Mezher, A. E.(2018)。Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys。International Journal of Electrical and Computer Engineering,8(5)。 | 20. | Malik, M.、Dutta, M.、Granjal, J.(2019)。A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things。IEEE Access,7,27443-27464。 | 21. | Lusetti, M.、Salsi, L.、Dallatana, A.(2020)。A blockchain based solution for the custody of digital files in forensic medicine。Forensic Science International: Digital Investigation,35。 | 22. | Lu, S.、Ostrovsky, R.、Sahai, A.、Shacham, H.、Waters, B.(2013)。Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles。Journal of Cryptology,26(2),340-373。 | 23. | Li, Y.、Li, X.、Liu, X.(2017)。A fast and efficient hash function based on generalized chaotic mapping with variable parameters。Neural Computing and Applications,28(6),1405-1415。 | 24. | Li, H.、Han, D.(2019)。EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme。IEEE Access,7,179273-179289。 | 25. | Kumar, P.、Chouhan, L.(2021)。A privacy and session key based authentication scheme for medical IoT networks。Computer Communications,166,154-164。 | 26. | Karati, A.、Islam, S. H.、Biswas, G.、Bhuiyan, M. Z. A.、Vijayakumar, P.、Karuppiah, M.(2018)。Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments。IEEE Internet of Things Journal,5(4),2904-2914。 | 27. | Kabra, N.、Bhattacharya, P.、Tanwar, S.、Tyagi, S.(2020)。MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions。Future Generation Computer Systems,102,574-587。 | 28. | Huang, Z.、Liu, S.、Mao, X.、Chen, K.、Li, J.(2017)。Insight of the protection for data security under selective opening attacks。Information Sciences,412,223-241。 | 29. | Hu, X.、Tan, W.、Xu, H.、Wang, J.、Ma, C.(2017)。Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications。Security and Communication Networks,2017。 | 30. | Höglund, J.、Lindemer, S.、Furuhed, M.、Raza, S.(2020)。PKI4IoT: Towards public key infrastructure for the Internet of Things。Computers & Security,89。 | 31. | He, D.、Zhang, Y.、Wang, D.、Choo, K. K. R.(2020)。Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography。IEEE Transactions on Dependable and Secure Computing,17(5),1124-1132。 | 32. | Gul, E.、Ozturk, S.(2019)。A novel hash function based fragile watermarking method for image integrity。Multimedia Tools and Applications,78,17701-17718。 | 33. | El-Rahman, S. A.、Aldawsari, D.、Aldosari, M.、Alrashed, O.、Alsubaie, G.(2018)。A Secure Cloud Based Digital Signature Application for IoT。International Journal of E-Services and Mobile Applications,10(3)。 | 34. | Elhabob, R.、Zhao, Y.、Sella, I.、Xiong, H.(2020)。An efficient certificateless public key cryptography with authorized equality test in IIoT。Journal of Ambient Intelligence and Humanized Computing,11,1065-1083。 | 35. | Chong, K. W.、Kim, Y. S.、Choi, J.(2021)。A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service。Information,12(2)。 | 36. | Cui, H.、Qin, B.、Susilo, W.、Nepal, S.(2020)。Robust digital signature revisited。Theoretical Computer Science,844,87-96。 | 37. | Dey, S.、Hossain, A.(2019)。Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography。IEEE Sensors Letters,3(4)。 | 38. | Duong, D. H.、Susilo, W.、Trinh, V. C.(2020)。A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme。Information,11(5)。 | 39. | Bralić, V.、Stančić, H.、Stengård, M.(2020)。A blockchain approach to digital archiving: digital signature certification chain preservation。Records Management Journal,30(3),345-362。 | 40. | Banerjee, S.、Odelu, V.、Das, A. K.、Chattopadhyay, S.、Kumar, N.、Park, Y.、Tanwar, S.(2018)。Design of an anonymity-preserving group formation based authentication protocol in global mobility networks。IEEE Access,6,20673-20693。 | 41. | Akter, S.、Michael, K.、Uddin, M. R.、McCarthy, G.、Rahman, M.(2022)。Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics。Annals of Operations Research,308,7-39。 | 42. | Alawida, M.、Teh, T. S.、Oyinloye, D. P.、Alshoura, W. H.、Ahmad, M.、Alkhawaldeh, R. S.(2020)。A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata。IEEE Access,8,113163-113174。 | 會議論文1. | Santini, P.、Baldi, M.、Chiaraluce, F.(2019)。Cryptanalysis of a One-Time Code-Based Digital Signature Scheme。2019 IEEE International Symposium on Information Theory,2594-2598。 | 2. | Kuznetsov, A.、Svatovskij, I.、Kiyan, N.、Pushkáov, A.(2017)。Code-based public-key cryptosystems for the post-quantum period。2017 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology,125-130。 | 3. | Kuznetsov, A.、Pushkaŕov, A.、Kiyan, N.、Kuznetsova, T.(2018)。Code-Based Electronic Digital Signature。The 9th IEEE International Conference on Dependable Systems, Services and Technologies,(會議日期: 24-27 May, 2018),331-336。 | 4. | Kazmirchuk, S.、Ilyenko, A.、Ilyenko, S.(2019)。Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves。ICCSEEA 2019,279-288。 | 5. | Géraud, R.、Naccache, D.、Rosie, R.(2019)。Robust encryption, extended。The Cryptographers' Track at the RSA Conference 2019,(會議日期: March 4-8, 2019),149-168。 | 6. | Dzhangarov, I.、Suleymanova, M. A.(2020)。Electronic digital signature。IOP Conference。 | 7. | Afrianto, I.、Heryandi, A.、Finandhita, A.、Atin, S.(2019)。E-Document Authentication With Digital Signature For Smart City: Reference Model。The 2nd ASEAN Workshop on Information Science and Technology,Universitas Komputer Indonesia 。 | 8. | Girault, M.(1991)。Self-certified Public Keys。The 10th Annual International Conference on Theory and Application of Cryptographic Techniques。Springer-Verlag。490-497。 | |