1 |
Microsoft : http://www.microsoft.com/windows/windowsmedia/drm.asp
|
2 |
J. Dubl, 'Digital Rights Management: A Definition,' IDC, 2001
|
3 |
J. Dubl, S. Kevorkian, 'Understanding DRM System: An IDC White paper', IDC, 2001
|
4 |
Intertrust : http://www.interturst.com
|
5 |
P. Vora, D. Reynolds, L. Dickinson, J. Erickson, D. Banks, 'Privacy and Digital Rights Management,' A position paper for the W3C Workshop on Digital Rights Management, January 2001
|
6 |
J. Feigenbaum, M. J. Freedman, T. Sander, A. Shostack, 'Privacy Engineering for Digital Rights Management Systems,' Workshop on Security and Privacy in Digital Rights Management, November 2001
|
7 |
ANSI X9.63 : Public key cryptography for the financial services industry : Key agreement and key transport using elliptic curve cryptography, ANSI, X9.63-199x draft, January 1999
|
8 |
ITU-T Recommendation X.509: Information Technology-Open Systems Inter-connection-The Directory: Authentication Framework
|
9 |
Aucsmith, D., 'Tamper Resistant Software: An Implementation,' in Anderson, R., ed., Information Hiding, First International Workshop, Cambridge, UK., Springer- Verlag Lecture Notes in Computer Science, Vol. 1174, pp. 317-333, May 1996
DOI
ScienceOn
|
10 |
J.M.Jeon, S.J.Park, B.C.Kim, D.H.Won, 'DRM Security Framework - ID Base Approach for Content Super-Distributions,' IDS, July 2001
|
11 |
Certicom Corp., 'Remarks on the security of the Elliptic curve cryptosystem,' 2000., http://www. certicom.com
|
12 |
R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, 'KryptoKnight Authentication and Key Distribution System,' Proceeding of ESORICS'92, November 1992
|
13 |
Brd J. Cox, 'Superdistribution: Objects As Property on the Electronic Frontier,' Addision-Wesley, May 1996
|
14 |
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
|
15 |
Stefan Brands, 'Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy,' MIT Press, August 2000
|
16 |
Julio Lopez and Ricardo Dahab, 'Performance of Elliptic Curve Cryptosysterns,' Technical report IC-00-08, 2000., http://www.dcc.unicamp.br/icmain/publications-e.html
|
17 |
C. H. Lim and P. J. Lee., 'A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup,' In Advances in Cryptology: Crypto '97m B. S. Kaliski, Jr., Ed., Lecture Notes in Computer Science 1294, Springer-Varlag. pp. 249-263, 1997
|
18 |
Schneier, Bruce., Applied Cryptography, Second Edition, Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley, 1996
|