參考文獻 |
[1] Joan Feigenbaum, Michael J. Freedman, Tomas Sander, and Adam Shostack, "Privacy Engineering for Digital Rights Management Systems", proceeding of the ACM Workshop on Security and Privacy in Digital
Rights Management, Nov 2001.
[2] A. M. Eskicioglu, J. Town, and E. J. Delp, “Security of digital entertainment content from creation to consumption” , Signal Process. Image Commun. (Special Issue on Image Security), vol. 18, no. 4,
pp. 237–262, Apr. 2003.
[3] A. M. Eskicioglu, “Protecting intellectual property in digital multimedia
networks” , IEEE Comput., vol. 36, pp. 39–45, Jul. 2003.
[4] F. Hartung and F. Ramme, “Watermarking of multimedia content
for m-commerce applications” , IEEE Commun. Mag., vol. 38, pp.
78–84, Nov. 2000.
[5] Siddharth Bhatta, Radu Sion, and Bogdan Carbunar, “A personal mobile DRM manager for smartphones”, computers & security 28 ( 2009 ), pp.327–340.
[6] Liu Q, Safavi-Naini R, and Sheppard NP, “Digital rights management for
content distribution ” , ACSW Frontiers ’03: proceedings of the Australasian information security workshop conference on ACSW frontiers 2003., pp. 49–58. 2003.
[7] E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, “Advances in Digital Video Content Protection” , Proceedings of the IEEE, Special Issue on Advances in Video Coding and Delivery, 2004.
[8] JungKyu Han, Hye-Young Chang, Seongje Cho, and Minkyu Park, “EMCEM: An Efficient Multimedia Content Encryption scheme for Mobile handheld devices ” , International Conference on Information Science and Security, 2008.
[9] Mark Stamp, “DIGITAL RIGHTS MANAGEMENT: THE TECHNOLOGY BEHIND THE HTPE”.
[10] H. Cheng and X. Li, “Partial encryption of compressed images and videos” , IEEE Transactions on Signal Processing, 48(8):2349-2451, 2000.
[11] C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm ” , In Proceedings of the ACM.
[12] Gunhee Kim, Dongkyoo Shin and Dongil Shin, “An Efficient Methodology for Multimedia Digital Rights Management on Mobile Handset ” , IEEE Transactions on Consumer Electronics, Vol. 50, No. 4, Nov. 2004.
[13] L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently”, In Proceedings of the ACM Multimedia 1996, pages 219-229, Boston, USA, 1996.
[14] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4”.
[15] Golic, “Linear statistical weakness of alleged RC4 keystream generaor”, In EUROCRYPT:Advances in Cryptology:Proceedings of EUROCRYPT, 1997.
[16] A. L. Grosul and D. S. Wallach, “a related-key cryptanalysis of rc4”, June 2000.
[17] Windows Media DRM.
http://www.microsoft.com/windows/windowsmedia/forpros/drm/default.mspx.
[18] Y. Liu, C. Yuan, and Y. Zhong, “A new digital rights management system in mobile applications using H.264 encryption” , in Proc. 9th Int. Conf. Adv. Commun. Technol., vol. 1. Feb. 2007, pp. 583–586.
[19] Identifying App Installations, Mar. 2011,
http://android-developers.blogspot.tw/2011/03/identifying-app-installations.html.
[20] Android Unique Device ID, Feb. 2011,
http://www.pocketmagic.net/?p=1662.
[21] Flash Media Server.
http://www.adobe.com/products/ashmediaserver/.
[22] Apple’s iPad 2 Makes Dual-Core Mainstream, Mar. 2, 2011
http://gigaom.com/2011/03/02/apples-ipad2-makes-dual-core-mainstream/
[23] 智慧手持裝置 - 搭上趨勢 動能不減
http://www.teema.org.tw/exhibition-detail.aspx?infoid=1966.
[24] DVB - The Digital Video Broadcasting Consortium.
http://www.teema.org.tw/exhibition-detail.aspx?infoid=1966.
|