參考文獻 |
[1] Diehl, Eric. Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012.
[2] Bhatt, Siddharth, Radu Sion, and Bogdan Carbunar. "A personal mobile drm manager for smartphones." Computers & Security 28.6 (2009): 327-340.
[3] Ku, William, and Chi-Hung Chi. "Survey on the technological aspects of digital rights management." Information Security. Springer Berlin Heidelberg, 2004. 391-403.
[4] "Nickolova, Maria, and Eugene Nickolov. "Verification and Application of Conceptual Model and Security Requirements on Practical DRM Systems in E-Learning." (2007).," [Online].
[5] A. Gal, "Reconciling Mozilla’s Mission and W3C EME," 14 5 2014. [Online]. Available: https://hacks.mozilla.org/2014/05/reconciling-mozillas-mission-and-w3c-eme/. [Accessed 1 7 2014].
[6] Schneier, Bruce, and Doug Whiting. "A Performance Comparison of the Five AES Finalists." AES Candidate Conference. 2000.
[7] Han, Jung Kyu, et al. "EMCEM: an efficient multimedia content encryption scheme for mobile handheld devices." Information Science and Security, 2008. ICISS. International Conference on. IEEE, 2008.
[8] Cheng, Howard, and Xiaobo Li. "Partial encryption of compressed images and videos." Signal Processing, IEEE Transactions on 48.8 (2000): 2439-2451.
[9] Shi, Changgui, and Bharat Bhargava. "A fast MPEG video encryption algorithm." Proceedings of the sixth ACM international conference on Multimedia. ACM, 1998.
[10] Kim, Gunhee, Dongkyoo Shin, and Dongil Shin. "An efficient methodology for multimedia digital rights management on mobile handset." Consumer Electronics, IEEE Transactions on 50.4 (2004): 1130-1134..
[11] Nurseitov, Nurzhan, et al. "Comparison of JSON and XML Data Interchange Formats: A Case Study." Caine 2009 (2009): 157-162.
[12] VideoLAN, "VLC media player," [Online]. Available: http://www.videolan.org/vlc/index.html. [Accessed 1 7 2014].
[13] Michiels, Sam, et al. "Digital rights management-a survey of existing technologies." CW Reports (2005).
[14] "The pros, cons, and future of DRM," 7 8 2009. [Online]. Available: http://www.cbc.ca/news/technology/the-pros-cons-and-future-of-drm-1.785237. [Accessed 1 7 2014].
[15] F. v. Lohmann, "Fair Use and Digital Rights Management: Preliminary Thoughts on the (Irreconcilable?) Tension between Them," 11 3 2005. [Online]. Available: https://www.eff.org/wp/fair-use-and-digital-rights-management-preliminary-thoughts-irreconcilable-tension-between-them. [Accessed 1 7 2014].
[16] Rune Hammersland and Jonas Strømstad, Rune Hammersland, and Jonas Strømstad. "Digital Rights Management" (2008).
[17] Herman, Bill D. "A Political History of DRM and Related Copyright Debates, 1987-2012." Yale Journal of Law and Technology 14.1 (2012): 2.
[18] FABLET, Maël. "The implementation of Digital Rights Management (DRM) by the Information Society Directive: a necessary evil?." (2007).
[19] Taylor, Jim, Mark R. Johnson, and Charles G. Crawford. DVD demystified. Vol. 1981. New York: McGraw-Hill, 2001.
[20] "How FairPlay Works: Apple′s iTunes DRM Dilemma," 26 2 2007. [Online]. Available: http://www.roughlydrafted.com/RD/RDM.Tech.Q1.07/2A351C60-A4E5-4764-A083-FF8610E66A46.html. [Accessed 1 7 2014].
[21] "Crosby, Scott, et al. "A cryptanalysis of the high-bandwidth digital content protection system." Security and Privacy in Digital Rights Management. Springer Berlin Heidelberg, 2002. 192-200.," [Online].
[22] Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 2010.
[23] Diffie, Whitfield, and Martin E. Hellman. "Exhaustive cryptanalysis of the NBS data encryption standard." Computer 10.6 (1977): 74-84.
[24] Fluhrer, Scott, Itsik Mantin, and Adi Shamir. "Weaknesses in the key scheduling algorithm of RC4." Selected areas in cryptography. Springer Berlin Heidelberg, 2001.
[25] Grosul, Alexander L., and Dan S. Wallach. "a related-key cryptanalysis of rc4." (2000).
[26] Dworkin, Morris. Recommendation for block cipher modes of operation. methods and techniques. No. NIST-SP-800-38A. NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD COMPUTER SECURITY DIV, 2001.
[27] Tang, Lei. "Methods for encrypting and decrypting MPEG video data efficiently." Proceedings of the fourth ACM international conference on Multimedia. ACM, 1997.
[28] Liu, Yang, Chun Yuan, and Yuzhuo Zhong. "A new digital rights management system in mobile applications using H. 264 encryption." The 9th International Conference on Advanced Communication Technology. Vol. 1. 2007.
[29] Iwakiri, Munetoshi, and Ta Minh Thanh. "Fundamental incomplete cryptography method to digital rights management based on JPEG lossy compression." Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on. IEEE, 20.
[30] Chodowiec, Pawel R. Comparison of the hardware performance of the AES candidates using reconfigurable hardware. Diss. George Mason University, 2002.
[31] Zhang, Yi, Xiaoguang Wei, and Shu Zhao. "Research on ODRL Connecting with Application Scenarios." Proceedings of the 2008 International Seminar on Future Information Technology and Management Engineering. IEEE Computer Society, 2008.
[32] Yang, Zongkai, Xiaoguang Wei, and Yi Zhang. "Research on REL Connecting with Application Scenarios in Education." Knowledge Acquisition and Modeling, 2008. KAM′08. International Symposium on. IEEE, 2008.
[33] Maeda, Kazuaki. "Performance evaluation of object serialization libraries in XML, JSON and binary formats." Digital Information and Communication Technology and it′s Applications (DICTAP), 2012 Second International Conference on. IEEE, 2012..
[34] McCullagh, Adrian, and William Caelli. "Non-repudiation in the digital environment." First Monday 5.8 (2000).
[35] Yi, Xun. "Hash function based on chaotic tent maps." Circuits and Systems II: Express Briefs, IEEE Transactions on 52.6 (2005): 354-357.
[36] Zhou, Jianying, and Kwok-Yan Lam. "Securing digital signatures for non-repudiation." Computer Communications 22.8 (1999): 710-716.
[37] G. Jain, "Digital Signature Algorithm," International Journal of Innovations in Computing, 2001.
[38] Vaudenay, Serge. "Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC, WTLS..." Advances in Cryptology—EUROCRYPT 2002. Springer Berlin Heidelberg, 2002.
[39] Rogaway, Phillip. "Evaluation of some blockcipher modes of operation." Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)..
[40] Alghazzawi, Daniyal M., Syed Hamid Hasan, and Mohamed Salim Trigui. "Advanced Encryption Standard-Cryptanalysis research." Computing for Sustainable Global Development (INDIACom), 2014 International Conference on. IEEE, 2014.
[41] Bellare, Mihir, et al. "A concrete security treatment of symmetric encryption." Foundations of Computer Science, 1997. Proceedings., 38th Annual Symposium on. IEEE, 1997.
[42] McGrew, David. "Counter mode security: Analysis and recommendations." Cisco Systems, November (2002)..
[43] "OpenSSL," [Online]. Available: https://www.openssl.org/. [Accessed 1 7 2014].
[44] "smartmontools," [Online]. Available: http://www.smartmontools.org/.
[45] A. SDK, "Settings.Secure," [Online]. Available: http://developer.android.com/reference/android/provider/Settings.Secure.html. [Accessed 1 7 2014].
[46] i. D. Library, "UIDevie Class Reference," [Online]. Available: https://developer.apple.com/library/ios/documentation/uikit/reference/UIDevice_Class/Reference/UIDevice.html#//apple_ref/occ/instp/UIDevice/identifierForVendor.
|