|
[1] The World Economic Forum, “How will blockchain technology transform financial services,“ https://www.weforum.org, Nov, 2015. [Online]. Available: https://www.weforum.org/agenda/2015/11/how-will-blockchain-technology-transform-financial-services. [Accessed November. 12, 2017] [2] Zyskind G. , Nathan O., Pentland A.S. "Decentralizing privacy: Using blockchain to protect personal data." IEEE International Conference in Security and Privacy Workshops , San Jose, CA, USA, May., 2015, pp. 180-184. [3] Lia, X., Baki, F., Tian, P., Chaouch, B.A. “A robust block-chain based tabu search algorithm for the dynamic lot sizing problem with product returns and remanufacturing. “Omega, Volume 42, Issue 1, Jan., 2014, pp. 75-87. [4] PWC Global FinTech Report, “How FinTech is shaping Financial Services?” http://www.pwc.com/gx/en/, Mar, 2016. [Online]. Available: https://www.pwc.de/de/newsletter/finanzdienstleistung/assets/insurance-inside-ausgabe-4-maerz-2016.pdf [Accessed November. 12, 2017] [5] IBM Global Business Services Public Sector Team , “Blockchain: The Chain of Trust and its Potential to Transform Healthcare–Our Point of View,” ibm.com, August 8, 2016 [Online]. Available: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=IUW03054USEN [Accessed November. 12, 2017] [6] Zheng, X., Yang, L., Ma, J., Shi, G., Meng D., “TrustPayz: Trusted mobile mayment on security enhanced ARM TrustZone platforms”, in Proc. IEEE Symp. Computers and Communication, Italy, 06, 2016, pp. 456 – 462. [7] Yang, J.-H., & Lin, P.-Y. “A mobile payment mechanism with anonymity for cloud computing,” Journal of Systems and Software, Volume 116, June., 2016, pp. 69-74. [8] Lu, J., Yang, Z., Li, L., Yuan, W., Li, L., & Chang, C.-C. “Multiple schemes for mobile payment authentication using QR code and visual cryptography,” Mobile Information Systems, Volume 2017, Mar., 2017, pp. 1-12. [9] Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z., “A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing,” Computer Standards & Interfaces, Volume 54, Part 1, Nov., 2017, pp. 55-60. [10] Hu, Y., Manzoor, A., Ekparinya, P., Liyanage, M., Thilakarathna, K., Jourjon, G., Seneviratne, A., Ylianttila, M.E.“A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain”, Computers and Society, University of Cornell, 2018. [11] S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system,” 2008. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf [Accessed November. 12, 2017] [12] L. Lamport, R. Shostak, M. Pease, “The Byzantine Generals Problem”, ACM Trans. Programming Languages and Systems, Volume 4, no. 3, July 1982, pp. 382-401. [13] A. Back. “Hashcash - A Denial of service Counter-Measure,” Aug., 2002. [Online]. Available: http://www.hashcash.org [Accessed November. 12, 2017] [14] D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology: Proceedings of Crypto, New York, Aug., 1983, pp. 199–203. [15] D. Johnson, A.Menezes, S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, Volume 1, Issue 1, Aug., 2001, pp. 36-63. [16] N. Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation, Volume 48, Number 177, Jan., 1987, pp. 203-209. [17] R. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM, Volume 21, Number 2, Feb., 1978, pp. 120-126. [18] S. Haber, W. S. Stornetta, “How to time-stamp a digital document”, Journal of Cryptology, Volume 3, Number 2, Jan., 1991, pp. 99-111. [19] G. J. Simmons, “Symmetric and Asymmetric Encryption”, ACM Computing Surveys, Volume 11, Number 4, Dec., 1979, pp. 305-330. [20] Ralph Merkle, “Protocols for Public Key Cryptosystems,” In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, Apr., 1980, pp. 122-136. [21] S. Haber and W. S. Stornetta, “Secure Names for Bit-Strings,” In Proc. of the 4th Conf. on Computer and Communications Security, NY, USA, Apr., 1997, pp. 28-35. [22] 吳中志,兩岸行動之付市場發展現況與合作契機,經濟前瞻;151,101-108,2014年。 [23] 蘇品長,植基於LSK和ECC技術之公開金鑰密碼系統,長庚大學電機工程研究所博士學位論文,2007年。 [24] D. Meffert, “Bilinear Pairings in Cryptography," in Master thesis, Radboud Universiteit Nijmegen, 2009. [25] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” In Proc. ASIACRYPT, Taipei, Taiwan, 2003, pp. 452–473, Lecture Notes in Computer Science, Volume 2894.
|