參考文獻 |
[1] bccResearch, "Digital Entertainment in the Home: Technologies and Global Markets," bccResearch, January 2014. [Online]. Available: http://www.bccresearch.com/market-research/information-technology/digital-entertainment-home-ift069b.html. [Accessed 27 Jun. 2016].
[2] “Optical Disc”, [Online]. Available:
http://searchstorage.techtarget.com/definition/optical-disc. [Accessed 30 Jun. 2016].
[3] "New Digital Home Entertainment Systems Market Report," ConnectedHome-World.com, 22 Feb. 2014. [Online]. Available: http://www.connectedhomeworld.com/content/new-digital-home-entertainment-systems-market-report. [Accessed 30 Jun. 2016].
[4] Wikipedia, "Video game console," 27 Jun. 2016. [Online]. Available: http://en.wikipedia.org/wiki/Video_game_console. [Accessed 30 Jun. 2016].
[5] Wikipedia, "Blu-ray," [Online]. Available: https://en.wikipedia.org/wiki/Blu-ray. [Accessed 28 6 2016].
[6] Wikipedia, "Advanced Access Content System," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Advanced_Access_Content_System. [Accessed 29 6 2016].
[7] Wikipedia, "Small and medium-sized enterprises," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Small_and_medium-sized_enterprises. [Accessed 29 6 2016].
[8] Wikipedia, "Small office/home office," 11 Jun. 2014. [Online]. Available: http://en.wikipedia.org/wiki/Small_office/home_office. [Accessed 30 Jun. 2016].
[9] S. O. Hwang, "How Viable Is Digital Rights Management?," Computer (Volume:42 , Issue: 4 ) , pp. 28-34, April 2009.
[10] Wikipedia, "Digital rights management," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Digital_rights_management. [Accessed 30 6 2016].
[11] “DVD vs. BD” [Online]. Available:
http://www.which.co.uk/reviews/blu-ray-dvd-players/article/blu-ray-versus-dvd
[Accessed 2 Jul. 2016].
[12] AACSLA, "Pre-recorded Video Book," [Online]. Available: http://www.aacsla.com/specifications/AACS_Spec_Prerecorded_Final_0.953.pdf. [Accessed 30 6 2016]
[13] AACSLA, "Recordable Video Book," [Online]. Available: http://www.aacsla.com/specifications/AACS_Spec_Recordable_Final_0_953.pdf. [Accessed 30 6 2016].
[14] “AACS LA Group” [Online]. Available: http://www.aacsla.com/home [Accessed 30 6 2016].
[15] Kevin Henry, Jiayuan Sui, Ge Zhong, "An Overview of the Advanced Access Content System (AACS)," David R. Cheriton School of Computer Science, Waterloo, ON, N2L 3G1, Canada, 2007
[16] "AACS Key Order Form," 27 Feb. 2012. [Online]. Available: http://www.aacsla.com/license/AACS_Key_Order_Form_120227.pdf. [Accessed 30 Jun. 2016].
[17] "AACS for independent producers," Sony Creative Software, Inc., 2014. [Online]. Available: http://www.sonycreativesoftware.com/dostudio/aacs_for_independent_producers. [Ac-cessed 30 Jun. 2016].
[18] Wikipedia, "BD+," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/BD%2B. [Accessed 29 6 2016].
[19] "Cinavia," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Cinavia. [Accessed 1 7 2016].
[20] 莊凱迪, “An Efficient and Non-Encrypted Blu-ray Video Duplication Protection Development.” (2015, NCU, Taiwan).
[21] “Advanced Encryption Standard” Wikipedia, [Online]. Available:
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[22] Dumbere, Dhananjay M., and Nitin J. Janwe. "Video encryption using AES algorithm." Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on. IEEE, 2014.
[23] Pseudorandom key generation :https://tools.ietf.org/html/rfc4086
[24] CMAC calculation :http://tools.ietf.org/html/rfc4493
[25] Naqvi, Syeda Iffat, and Adeel Akram. "Pseudo-random key generation for secure HMAC-MD5." Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011.
[26] Nallanthighal, Raghava, and Vijeta Rani. "Pseudorandom Binary Key Generation from Binary Files." Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. IEEE, 2011.
[27] Matsumoto, Makoto, and Takuji Nishimura. "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator."ACM Transactions on Modeling and Computer Simulation (TOMACS) 8.1 (1998): 3-30.
[28] Bertoni, Guido, et al. "Error analysis and detection procedures for a hardware implementation of the advanced encryption standard." IEEE Transactions on Computers 52.4 (2003): 492-505.
[29] Zhang, Xinmiao, and Keshab K. Parhi. "High-speed VLSI architectures for the AES algorithm." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 12.9 (2004): 957-967.
[30] Teoh, Andrew BJ, David CL Ngo, and Alwyn Goh. "Personalised cryptographic key generation based on FaceHashing." Computers & Security23.7 (2004): 606-614.
[31] “Station-to-Station key agreement protocol” Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Station-to-Station_protocol
[32] Yi, Qingqing, Huaqun Guo, and Wai-Choong Wong. "Design and implementation of Sub-Cover difference broadcast encryption algorithm."Information, Communications and Signal Processing (ICICS) 2011 8th International Conference on. IEEE, 2011.
[33] Parsons, June Jamrich, and Dan Oja. New Perspectives on Computer Concepts 2012: Introductory. Cengage Learning, 2011.
[34] Intel Corp., International Business Machines Corp., Microsoft Corp., Panasonic Corp., Sony Corp., Toshiba Corp., The Walt Disney Company, and Warner Bros, “AACS Introduction and Common Cryptographic Elements Book,” September 2009.
[35] Myska, M.: The True Story of DRM. Masaryk UJL & Tech. 3, 267 (2009) |