References
- Seung-Soo Shin, Yong-Young Kim, "A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution", The Journal of Digital Policy & Management, Vol.10, No.6, pp.231-239, 2012.
- Spectral Lines, "Talking about Digital Copyright," IEEE Spectrum, Vol.38. 2001,
- Jiaming He, Hongbin Zhang, "Digital Right Management Model Based on Cryptography and Digital Watermarking," December 2008 CSSE '08 : Proceedings of the 2008 International Conference on Computer Science and Software Engineering -Vol.03, 2008.
- Jong-Yong Park,, Young-Hak Kim, Tae-Young Choe, "Design and Evaluation of DRM Model with Strong Security Based on Smart Card", Journal of Digital Contents Society, Vol.12, No.2, pp.165-176, 2011. https://doi.org/10.9728/dcs.2011.12.2.165
- H. Y Chien, C. H. Chen, "A remote authentication scheme preserving user anonymity," IEEE AINA' 05, Vol.2, pp.245-248, 2005.
- M. S Hwang, L. H Li, "A new remote user authentication scheme using smart cards," IEEE Trans. On Consumer Electronics, Vol.46, No.1, pp. 28-30, 2000. https://doi.org/10.1109/30.826377
- H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. On Consumer Electronics, Vol.46, No.4, pp.958-961, 2000. https://doi.org/10.1109/30.920446
- H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: Smart Card," Computers and Security, Vol.21, No.4, pp.372-375, 2002. https://doi.org/10.1016/S0167-4048(02)00415-7
- M. L Das, A. Saxena, V. P Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, Vol.50, No. 2, pp.629-631, 2004. https://doi.org/10.1109/TCE.2004.1309441
- L. Hu, Y. Yang, X. Niu, "Improved remote user authentication scheme preserving anonymity," Fifth Annual Conference on Communication Network and Services Research(CNSR), pp.323-328, 2007.
- T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol .IT-31, pp.469-472, 2985.
- P. Kocher, J. Haffe, B. Jun, "Differential power analysis," Proceedings of Advances in Cryptology (CRYPTO 99), pp.388-398, 1998.
- T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Examining smart cards security under the threat of power analysis," IEEE Transactions on Computers, 51(5), pp.541-552, 2002. https://doi.org/10.1109/TC.2002.1004593