References
- J. Dubl, 'Digital Rights Management: A Definition,' IDC, 2001
- J. Dubl, S. Kevorkian, 'Understanding DRM System: An IDC White paper', IDC, 2001
- Microsoft : http://www.microsoft.com/windows/windowsmedia/drm.asp
- Intertrust : http://www.interturst.com
- P. Vora, D. Reynolds, L. Dickinson, J. Erickson, D. Banks, 'Privacy and Digital Rights Management,' A position paper for the W3C Workshop on Digital Rights Management, January 2001
- J. Feigenbaum, M. J. Freedman, T. Sander, A. Shostack, 'Privacy Engineering for Digital Rights Management Systems,' Workshop on Security and Privacy in Digital Rights Management, November 2001
- R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, 'KryptoKnight Authentication and Key Distribution System,' Proceeding of ESORICS'92, November 1992
- Brd J. Cox, 'Superdistribution: Objects As Property on the Electronic Frontier,' Addision-Wesley, May 1996
- ANSI X9.63 : Public key cryptography for the financial services industry : Key agreement and key transport using elliptic curve cryptography, ANSI, X9.63-199x draft, January 1999
- ITU-T Recommendation X.509: Information Technology-Open Systems Inter-connection-The Directory: Authentication Framework
- Stefan Brands, 'Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy,' MIT Press, August 2000
- Aucsmith, D., 'Tamper Resistant Software: An Implementation,' in Anderson, R., ed., Information Hiding, First International Workshop, Cambridge, UK., Springer- Verlag Lecture Notes in Computer Science, Vol. 1174, pp. 317-333, May 1996 https://doi.org/10.1007/3-540-61996-8_49
- J.M.Jeon, S.J.Park, B.C.Kim, D.H.Won, 'DRM Security Framework - ID Base Approach for Content Super-Distributions,' IDS, July 2001
- Certicom Corp., 'Remarks on the security of the Elliptic curve cryptosystem,' 2000., http://www. certicom.com
- Julio Lopez and Ricardo Dahab, 'Performance of Elliptic Curve Cryptosysterns,' Technical report IC-00-08, 2000., http://www.dcc.unicamp.br/icmain/publications-e.html
- C. H. Lim and P. J. Lee., 'A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup,' In Advances in Cryptology: Crypto '97m B. S. Kaliski, Jr., Ed., Lecture Notes in Computer Science 1294, Springer-Varlag. pp. 249-263, 1997
- Schneier, Bruce., Applied Cryptography, Second Edition, Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley, 1996
- A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997