|
[1] Wen-Guey Tzeng, “A secure fault-tolerant conference-key agreement protocol,” IEEE Transactions on Computers,” vol. 51, 2002, pp.: 373 -379. [2] Digital transmission content protection specification information version vol. 1 July, 2001. [3] Digital transmission content protection specification information version supplement A “Mapping DTCP to USB,” vol. 1 July, 2001. [4] Digital transmission content protection specification information version supplement B “Mapping DTCP to MOST,” vol1 July, 2001. [5] Siaw-Lynn Ng, Comments on “Dynamic participation in a secure conference scheme for mobile communications,” IEEE Trans. vol. 50, 2001, pp.334 -335. [6] Federal Information Processing Standards (FIPS) Publication 186-2 Digital Signature Standard January 27, 2000. [7] IEEE 1394 “IEEE Standard for a High Performance Serial Bus,” June 2000. [8] IEEE 1363 “IEEE Standard for Public-Key Cryptography,” Aug 2000. [9] DTLA “Policy Statements Regarding DTCP Adapters,” January 1999. [10] NIST “Recommended Elliptic Curve for Federal Government Use,” July 1999. [11] M. S. Hwang, “Dynamic participation in a secure conference scheme for mobile communications,” IEEE Trans. Vehicular Technology vol. 48, September 1999 pp.1469 -1474. [12] 5C Digital Transmission Content Protection White Paper July 1998. [13] PKCS#13 Elliptic Curve Cryptography Standard January 1998. [14] ANSI X9.62 “Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA),” 1998. [15] T. C. Wu, “Conference key distribution system with user anonymity based on algebraic approach,” IEE Proceedings on Computers and Digital Techniques vol. 144, 1997 pp. 145 -148. [16] M. S. Hwang and W. P. Yang, “Conference key distribution schemes for secure digital mobile communications,” IEEE Journal Selected Areas in Communications,” vol. 13, 1995, pp. 416 -420. [17] C. S. Laih and S. M. Yen, “On the design of conference key distribution systems for the broadcasting networks,” Annual Joint Conf. of the IEEE Computer and Communications Societies,” 1993, pp. 1406 -1413. [18] PKCS#3 Diffie-Hellman Key Agreement Standard, November 1993. [19] Diffie, W., and Hellman, M. “New Directions in Cryptography.” IEEE Transactions on Information Theory, 1976 pp.644-654. [20] Jonathan Knudsen “Java Cryptography” Publisher: O’Reilly. [21] Elliotte Rusty Harold “Java Network Programming” Publisher: O’Reilly. [22] Elliotte Rusty Harold “Java I/O” Publisher: O’Reilly. [23] Harvey M. Deitel and Paul J. Deitel, “Java How to Program 4/e” Publisher: Prentice Hall. [24] American National Standard Institute (ANSI) http://www.ansi.org/. [25] National Institute of Standard Technology (NIST) http://www.nist.gov/. [26] Digital Transmission Licensing Administrator http://www.dtcp.com. [27] The Source for Java Technology http://java.sun.com/. [28] JCE Provider-IAIK http://jcewww.iaik.tu-graz.ac.at//index.php. [29] JCE Provider-Bouncy Castle http://www.bouncycastle.org/. [30] Philips PDI1394 AV Link Chipset Information http://www-us7.semiconductors.philips.com/pip/PDI1394L41.
|