|
1.中華民國著作權法, http://www.tipo.gov.tw/copyright/copyright_law/copyright_law_93.asp, 2004年9月8日 2.中華電信, emome-行動生活, http://www.emome.net/cgi-bin/MASP/jsp/emomeWeb/index.jsp 3.中華電信, 行動電話篇, http://www.cht.com.tw/CompanyCat.php?CatID=339 4.和信電訊, GPRS大補帖, http://www.mobiphone.com.tw/gprs/gprs-say.asp 5.虞孝成,美國V-Chip相關規定,http://www.dvo.org.tw/publication/20000202.html, 2000年2月 6.賴溪松, 韓亮, 張真誠, 近代密碼學及其應用, 第2版, 松岡電腦圖書資料股份有限公司, 1998年 7.4FO AG homepage, http://www.4fo.de/en/index.htm 8.Apple Computer iTunes Homepage, http://www.apple.com/itunes/ 9.Willms Buhse, Implications of Digital Rights Management for Online Music - A Business Perspective, DRM 2001, LNCS 2320, pp. 201-212, 2002 10.Yevgeniy Dodis, Nelly Fazio, Public Key Broadcast Encryption for Stateless Receivers, DRM 2002, LNCS 2696, pp. 61-80, 2003 11.Federal Communication Commission, V-Chip Homepage, http://www.fcc.gov/vchip/, January 11, 2000 12.Richard Gooch, Requirements for DRM Systems, Digital Rights Management, pp. 16-25, LNCS 2770, 2003 13.Google Blog Homepage, http://www.google.com/googleblog/ 14.Susanne Guth, Gustaf Neumann, Mark Strembeck, Experiences with the Enforcement of Access Rights Extracted from ODRL-based Digital Contracts, DRM 2003, pp. 90-102, October 27, 2003 15.Susanne Guth, Rights Expression Languages, Digital Rights Management, LNCS 2770, pp. 101-112, 2003 16.Frank Hartung, Mobile DRM, Digital Rights Management, LNCS 2770, pp. 138-149, 2003 17.IBM, EMMS, http://www-306.ibm.com/software/data/emms/ 18.IDMT Homepage, http://www.idmt.fraunhofer.de/presse/textarchiv.htm 19.Kai Schmitz-Hofbauer, DRM-Systeme, http://imperia.rz.rub.de:9085/imperia/md/content/seminare/itsws03_04/vortraege/drm_vortrag.pdf, December 02, 2004 20.Pramod A. Jamkhedkar, Gregory L. Heileman, DRM as a Layered System, DRM 2004, pp. 11-21, October 25, 2004 21.Dan Kaminsky, MD5 To Be Considered Harmful Someday http://www.securitydocs.com/library/3079.pdf, March 04,2005 22.Aggelos Kiayias, Moto Yung, Breaking and Repairing Asymmetric Public-Key Traitor Tracing, DRM 2002, LNCS 2696, pp. 32-50, 2003 23.Kimio Kuramitsu , Tadashi Murakami , Hajime Matsuda, Ken Sakamura, TTP:Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-proof Devices, The Twenty-Fourth Annual International Computer Software and Applications Conference, pp. 87-92, IEEE, 2000 24.Brian A. LaMacchia, Key Challenges in DRM : An Industry Perspective, DRM 2002, LNCS 2696, pp.51-60, 2003 25.Yingjiu Li, Huiping Guo, Sushil Jajodia, Tamper Detection and Localization for Categorical Data Using Fragile Watermarks, DRM 2004, pp. 73-82, October 25, 2004 26.Sirpa H. lkola, Mobile DRM, http://www.forum.nokia.com/seap/Digital_Rights_Management_Sirpa_Ikola2.pdf 27.Thomas S. Messerges, Ezzat A. Dabbish, Digital Rights Management in a 3G Mobile Phone and Beyond, DRM 2003, pp. 27-38, October 27, 2003 28.Microsoft and Nokia Collaborate to Help Ensure Consumers Can Enjoy Digital Music Anywhere, http://press.nokia.com/PR/200502/980519_5.html, February 14, 2004 29.Microsoft Media Player Homepage, http://www.microsoft.com/windows/windowsmedia/default.aspx 30.Microsoft Windows Media DRM 10, http://www.microsoft.com/windows/windowsmedia/drm/default.aspx 31.Motorola and Apple Bring iTunes® Music Player to Motorola’s Next-generation Mobile Phones, http://www.motorola.com/mediacenter/news/detail/0,,4505_3838_23,00.html, July 26, 2004 32.Deirdre Mulligan, Aaron Burstein, Implementing Copyright Limitations in Rights Expression Languages, DRM 2002, LNCS 2696, pp. 137-154, 2003 33.Deirdre K. Mulligan, John Han, Aaron J. Burstein, How DRM-Based Content Delivery Systems Disrupt Expectations of “Personal Use”, DRM 2003, pp. 77-89, October 27, 2003 34.Theodor Holm Nelson, Xanalogical Structure, Needed Now More than Ever: Parallel Documents, Deep Links to Content, Deep Versioning, and Deep Re-Use, ACM Computing Surveys (CSUR), Volume 31, Issue 4es, Article No. 33, 1999 35.Nokia, Mobile DRM, http://www.forum.nokia.com/seap/Digital_Rights_Management_Sirpa_Ikola2.pdf 36.OMA DRM Requirements v2.0, http://www.openmobilealliance.org/release_program/docs/DRM/V2_0-20041207-C/OMA-RD-DRM-V2_0-20040715-C.pdf 37.OMA DRM v1.0, http://www.openmobilealliance.org/release_program/drm_v10.html 38.OMA DRM v2.0, http://www.openmobilealliance.org/release_program/drm_v20.html 39.Open Digital Rights Language v1.1, http://odrl.net/1.1/ODRL-11.pdf 40.Open Mobile Alliance Digital Rights Management Specification Version 2.0, http://www.openmobilealliance.org/release_program/docs/DRM/V2_0-20041207-C/OMA-DRM-DRM-V2_0-20041210-C.pdf, December 10, 2004 41.Open Mobile Alliance Digital Rights Management Version 1.0, http://www.openmobilealliance.org/release_program/docs/DRM/V1_0-20040625-A/OMA-Download-DRM-V1_0-20040615-A.pdf, June 15, 2004 42.Open Mobile Alliance Download Architecture Version 1.0, http://www.openmobilealliance.org/release_program/docs/DRM/V1_0-20040625-A/OMA-Download-ARCH-V1_0-20040625-A.pdf, June 15, 2004 43.Open Mobile Alliance DRM Content Format Version 1.0, http://www.openmobilealliance.org/release_program/docs/DRM/V1_0-20040625-A/OMA-Download-DRMCF-V1_0-20040615-A.pdf, June 15, 2004 44.Open Mobile Alliance DRM Content Format Version 2.0, http://www.openmobilealliance.org/release_program/docs/DRM/V2_0-20041207-C/OMA-DRM-DCF-V2_0-20041213-C.pdf, December 13, 2004 45.Open Mobile Alliance DRM Rights Expression Language Version 2.0, http://www.openmobilealliance.org/release_program/docs/DRM/V2_0-20041207-C/OMA-DRM-REL-V2_0-20041210-C.pdf, December 10, 2004 46.Open Mobile Alliance Homepage , http://www.openmobilealliance.org/ 47.Open Mobile Alliance Rights Expression Language Version 1.0, http://www.openmobilealliance.org/release_program/docs/DRM/V1_0-20040625-A/OMA-Download-DRMREL-V1_0-20040615-A.pdf, June 15, 2004 48.Fabien A.P. Petitcolas, Digital Watermarking, Digital Rights Management, LNCS 2770, pp. 81-92, 2003 49.Benny Pinkas, Efficient State Updates for Key Management, DRM 2001, LNCS 2320, pp. 40-56, 2002 50.Project Xanadu homepage, http://xanadu.com/ 51.Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater, Securing Mobile Appliances: New Challenges for the System Designer, Design, Automation and Test in Europe Conference and Exhibition (DATE'03), pp. 10176-10181, IEEE Computer Society, 2003 52.RealNetworks, RealSystem Media Commerce Suite Technical White Paper, http://docs.real.com/docs/drm/DRM_WP1.pdf 53.Reihaneh SafaviNaini, Nicholas Paul Sheppard, Takeyuki Uehara, Import/Export in Digital Rights Management, DRM 2004, pp. 99-110, October 25, 2004 54.Gabriele Spenger, Authentication, Identification Techniques, and Secure Containers – Baseline Technologies, LNCS 2770, pp. 62-80, 2003 55.W3C XML Homepage, http://www.w3.org/XML/ 56.XrML Homepage, http://www.xrml.org/
|