1 |
L. Rizzo, L. Vicisano, 'Replacement Polices for a Proxy Cache,' IEEE/ACM Trans. Networking, Vol.8, No.2, pp.158-170, 2000
DOI
ScienceOn
|
2 |
Thorwkrth N. J., Horvatic P., Weis R., Jian zhap, 'Securitymethods for MP3 music delivery,' Signals, Systems and Computers, 2000. Conference Record of the Thirty-Fourth Asilomar Conference on Vol.2, pp.1831-1835, 2000
DOI
|
3 |
C. Serrao, J. Marques, T. Baker, M. Balestri, P. Kudumakis, 'Protecting Digital Music Delivery and Consumption Using the OCCAMM Project Framework,' Second International Conference on WEB Delivering of Music(WEDELMUSIC '02), Darmstadt, Germany, December, 2002
DOI
|
4 |
ITU-T Rec. X.509, Interconnection-The Dictionary : Public-key and attribute certificate framework, March, 2000
|
5 |
W. Diffie and M. E. Hellman, 'New Directions in Cryptography,' IEEE Transaction on information theory, Vol. 1T-22, No.6, Nov., 1976
|
6 |
Spctral Lines, 'Talking About Digital Copyright,' IEEE Spectrum, Vol.38, Issue 6, p.9, June, 2001
DOI
ScienceOn
|
7 |
A. O. Freier, P. Karlton and P. C. Kocher, 'The SSL Protocol Version 3.0,' www.netscape.com/eng/ssl3, Nov., 1996
|
8 |
G. Barish, K. Obraczka, World Wide Web Caching : Trends and Techniques, IEEE Communications, Internat Technology Series, May, 2000
DOI
ScienceOn
|
9 |
R. Rivest, A. Shamir and L. Adelman, 'A Method for Obtaining Digital Signatures and Public Key Crypto systems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978
DOI
ScienceOn
|
10 |
H. Bahn, S. Noh, S. L. Min, and K. Koh, 'Efficient Replacement of Nonuniform Objects in Web Caches,' IEEE Computer, Vol.35, No.6, pp.65-73, June, 2002
DOI
|