|
1.M. Bellare and R. Sandhu, "The Security of Practical Two-party RSA Signature Schemes", Manuscript, 2001. 2.C. Boyd, “Digital multi-signature”, in Proceedings of Conference on Coding and Cryptography, 1986, pp. 15-17 3.D. Chadwick, "Smart Cards aren''t always the Smart Choice", IEEE Computer, Volume 32, Issue 12, Dec. 1999, pp.142-143. 4.H. Chang and M. G. Atallah, "Protecting Software Code By Guards", ACM Workshop on Security and Privacy in Digital Rights Management, 2001. 5.Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, and Willem Jonker, "Privacy in an Identity-based DRM System", IEEE Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA’03), Prague, September 2003, pp.389-395. 6.J. S. Erickson, "Fair use, DRM, and Trusted Computing", Communications of the ACM, Vol.46(4), 2003, pp.34-39. 7.E. W. Felten, "A Skeptical View of DRM and Fair Use", Communications of the ACM, Vol. 46(4), 2003, pp.56-59. 8.Pramod A. Jamkhedkar and Gregory L. Heileman, "DRM as a Layered System", ACM DRM Washington, DC, USA., October 25, 2004. 9.Mayur Kamat, "Security Requirements for Digital Rights Management", TRACK: Leading Edge and Emerging Technologies, October 14, 2003. 10.Taekyoung Kwon, "Virtual Software Tokens – A Practical Way to Secure PKI Roaming", Proceedings of the Infrastructure Security (InfraSec), Vol. 2437 of LNCS, Springer-Verlag, 2002, pp.288-302. 11.Taekyoung Kwon, "Refinement and Improvement of Virtual Software Token Protocols", IEEE Communications Letters, Vol. 8, Issue 1, Jan. 2004, pp.75-77. 12.Qiong Liu, Reihaneh Safavi-Naini, and Nicholas Paul Sheppard, "Digital Rights Management for Content Distribution", Australasian Information Security Workshop, 2003. 13.D.K. Mulligan, J. Han, and A.J. Burstein, "How DRM-Based Content Delivery Systems Disrupt Expectations of Personal Use", ACM DRM 2003, Washington D.C., USA, October 27, 2003, pp.77-89. 14.T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against alicious Hosts. In G. Vigna (ed.)", Mobile Agent Security of LNCS, 2003. 15.Hung-Min Sun, Chi-Fu Hung, and Bying-He Ku, "An Improved Identity- Based DRM System", The 15th Information Security Conference(ISC2005), Kaohsiung, Taiwan , June 2005. 16.Jeffrey Dambrtowski, "InterTrust''s Role in Information Assurance for Digital Media", http://www.acsu.buffalo.edu/~jwd/MGS602project/intertrust.shtml, Nov. 20, 2003. 17."FairPlay:Effectiveness and Weaknesses of Apple’s Digital Right Management Technology", http://e170.ex.com/p1/indigo.pdf 18.IDC, http://www.idc.com 19.J. Manferdelli, "Q&A: Microsoft Seeks Industry-Wide Collaboration for ‘Palladium’ Initiative", http://www.microsoft.com/presspass/features/2002/jul02/07-01palladium.mspx 20.Microsoft,"Secure Audio Path", http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmrm10/htm/wmrm_sdk_guide_ncbj.asp 21.Microsoft, "Windows Media Digital Rights Management", http://www.microsoft.com/windows/windowsmedia/tw/drm/default.aspx 22.Microsoft, "Microsoft Window Right Management Services System", http://www.microsoft.com/taiwan/windowsserver2003/technologies/rightsmgmt/default.mspx 23.National Institute of Standards and Technology, http://www.nist.org. 24.Trusted Computing Group, https://www.trustedcomputinggroup.org 25.陳育毅、蔡柏宏、詹進科, "建立家庭網路與個人合理使用的跨平台數位產權管理機制", 2005商管與資訊研討會(Taiwan conference on Business and Information), Sep. 29-30, 2005. 26."中華民國著作權法", http://www.cca.gov.tw/law/html/7-1.html
|