1 |
Whitfield Diffie and Martin Hellman, 'New Directions in Cryptography, ' IEEE Transaction on Information Theory, VoI.IT-22, No.6, pp.644-654, November, 1976
DOI
|
2 |
Intertrust: http://www.intertrust.com/main/overview/drm.html
|
3 |
Joshua Duhl and Susan Kevorkian, 'Unde rstanding DRM system: An IDC White paper,' IDC, 2001
|
4 |
Joshua Duhl, 'Digital Rights Management: A Definition,' IDC 2001
|
5 |
Microsoft: http://www.microsoft.com/windows/windowsmedia/drm.asp
|
6 |
V.K. Gupta, 'Technological Measures of Protection,' Proceedings of International Comference on WIPO, Seoul Korea, October, 25-27, 2000
|
7 |
김정재 외 2명, '동영상 데이터 보호를 위한 공유키 풀 기반의 DRM 시스템,' 정보처리학회논문지C, Vol.12-C No.02, pp. 0183-0190, April, 2005
과학기술학회마을
DOI
ScienceOn
|
8 |
김지홍 외 5명, '전자상거래 보안기술', 생능출판사, 2001
|
9 |
Brad Cox, Superdistribution: Objects As Property on the Electronic Frontier, Addision-Wesley, May, 1996
|
10 |
Sung, J. Park, 'Copyrights Protection Tech niques,' Proceedings International Digital Content Conference, Seoul Korea, Nov., 28-29, 2000
|