1 |
F Wang, Y. Xiong and J. Liu, "mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming," IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 3, 2010, pp. 379-392.
DOI
ScienceOn
|
2 |
J. Qingqi Pei, Kefeng Fan, Jianfeng Ma, and Jinxiu Dai, "An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices," IEEE Computational Intelligence and Security, 2006 International Conference on 3-6 , Vol. 2, Nov. 2006, pp. 1032-1036.
|
3 |
장은겸, 이범석, "네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘," 디지털산업정보학회지, 제6권, 제2호, 2010, pp. 129-140.
|
4 |
J. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park, "Formal Model and Policy Specication of Usage Control," ACM Transactions on Information and System Security, Vol. 8, No. 4, Nov. 2005, pp. 351-387.
DOI
|
5 |
권준희, 김성림, "유비쿼터스 환경에서 상황 데이터 기반 모바일 콘텐츠 서비스를 위한 추천 기법," 디지털산업정보학회지, 제6권, 제2호, 2010, pp. 1-9.
|
6 |
Y. Zhang, "Digital Watermarking Technology: A Review," International Conference on Future Computer and Communication, 2009, pp. 250-252.
|
7 |
Lip Y. Por, Ang T. Fong, and B. Delina, "Whitesteg: a new scheme in information hiding using text steganography," WSEAS Transactions on Computers, Vol. 7, 2008, pp. 735-745.
|
8 |
Richard Bergmair, "A comprehensive bibliography of linguistic steganography," In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, Vol. 6505, 2007.
|
9 |
양정모, IT 융합보안의 길잡이 암호학, 경문사, 2013.
|
10 |
C. Kim, "Differential fault analysis of AES: Toward reducing number of faults," Information Sciences, Vol. 199, 2012, pp. 43-57.
DOI
ScienceOn
|