1 |
D. Y. Jang, Windows Architecture and Principles: Principles of Programming through the OS, Seoul, Korea: Hanbit Media, 2006, Ch. 14.
|
2 |
J. Richter, Advanced Windows Third Edition, Microsoft Press, 2006.
|
3 |
E. N. Dekker and J. M. Newcomer, Developing Windows NT Device Drivers, Microsoft Press, 1999.
|
4 |
J. Prosise, Programming Windows with MFC, Washington, USA:Microsoft Press, 2001.
|
5 |
C. Petzold, Bitmaps and bitblts, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 14, pp. 641-711.
|
6 |
Y. Lee, D. H. Hwang and S. W. Kwak, "Security program and computing device for providing security function per each user session and method therefore," ROK. Patent 10 2019 0025814, Mar. 7, 2019.
|
7 |
M. Pierer, Mobile Device Management, Wiesbaden: Springer Fachmedien Wiesbaden, 2016.
|
8 |
D. Till, J. Lee and S. Lee, iOS Application Security, Seoul, Korea, Acorn Publishing Co., 2017.
|
9 |
Y. Lee and Y. Y. Yu, "Computer program for preventing information spill displayed on display device and security service using the same," ROK. Patent pending 10 2020 0053260, May, 4, 2020.
|
10 |
D. Eran, "How Fairplay Works: Apple's iTunes DRM Dilemma," Internet archive Available: (archive.org) 3, Mar., 2007. [Online]. Available: https://web.archive.org/web/20170927030905/http:/www.roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html
|
11 |
M. Rouse and J. Madden, "Desktop virtualization," Tech target.
|
12 |
S. G. Yoon and D. H. Hwang, "Method for managing secure access of mobile application," ROK. Patent 10 1420 3830000, Oct., 16, 2012. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/3830000
|
13 |
C. Petzold, Blocking by examining the handle value using the hooking technique of the detours method, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 21, pp. 1243-1266.
|
14 |
E. Diehi, Securing digital video techniques for DRM and content protection, Berlin, German: Springer Berlin Heidelberg, 2012.
|
15 |
M. Ashish and D. Vedvyas, Watermarking Techniques for Copyright Protection of Videos, Springer International Publishing, 2019.
|
16 |
Y. Lee and D. H. Hwang, "Computer program to prevent leakage of information on display device and security service using it," ROK. Patent 10 2018 0020509, Feb., 21, 2018.
|
17 |
C. Petzold, The clipboard, in Programming Windows, 5th ed, Washington, USA: Microsoft Press, 1998, Ch. 12, pp. 567-590.
|
18 |
K. Makan and S. Alexander-Bown, Android Security Cookbook, Birmingham, UK: Packt Publishing Limited, 2013.
|
19 |
J. A. Siegel and P. J. Saukko, Fingerprints, in Encyclopedia of Forensic Sciences, 2nd ed, Oxford, UK: Elsevier Science & Technology, pp. 346-351, 2013.
|
20 |
F. Rahman, M. Farmani, M. Tehranipoor and Y. Jin, "Hardware-assisted cybersecurity for IoT devices," in Proc. of 18th International Workshop on Microprocessor and Social Testing, Security and Verification, TX, USA: MTV, pp. 51-56, 2017.
|
21 |
J. H. Yu, "Apparatus and method for scene (screen) capture security," ROK. Patent 10 1403 6950000, May, 28, 2014.
|