[1]王峻彥,時戳服務模式與運作機制,國立海洋大學資訊科學學系碩士班,碩士論文,91[2]陳煜文(2003),以數位權利為基礎的商品交易機制,世新大學管理學院資訊管理系碩士學位論文。[3]黃明祥、林詠章,資訊與網路安全概論-建構安全的電子商務系統,美商麥格羅‧希爾,臺北,民國九十四年。
[4]陳俊德、林坤德,「以動態情境控制與metadata控制存取數位文物之個人化數位權利管理機制」, 2006數位科技與創新管理國際研討會,華梵大學,台北縣,民國九十五年四月,P163。
[5]陳俊德、李昆霖、吳盈杰,「架構一個以角色為金鑰管理基礎的企業RFID標籤加密與隱私管理」,2006數位科技與創新管理國際研討會論文集(IDTIM 2006),第166頁,2006年。
[6]陳俊德、林坤德、王信弼 「數位化違規照相開單的數位權利管理模式」 第九屆資訊管理學術暨警政資訊實務研討會-新興電腦犯罪之偵防(Prevention of Emerging Cybercrimes),中央警察大學,桃園縣,民國九十四年五月,P139-147。
[7]Horster P., Michels M. and Petersen H., “Authenticated encryption schemes with low communication costs,” Electronics Letters, Vol. 30, No. 15, 1994, pp. 1212-1213.
[8]David L. Mills(1992),“Network Time Protocol (Version 3) Specification, Implementation and Analysis,” RFC 1305, 1992
[9]Hunt, R.,”PKI and Digital Certification Infrastructure(2001),” Proceedings of the 9th IEEE International Conference on Networks,Bangkok, 2001,pp.234-239
[10]R. Molva,G. Tsudik, E. Van Herreweghen, S. Zatti(1992),”KryptoKnight Authentication and Key Distribution System,”ESORICS, 1992, pp.155-174
[11]Y. Desmedt. “Society and group oriented cryptography: A new concept,” In: Advances in Cryptology, Proceedings of Crypto''87, Lecture Notes in Computer Science, vol. 293. Springer-Verlag, 1988, pp. 120-127. [12] A. Shamir, ‘‘How to share a secret,’’ Commum. ACM, vol. 22, Nov. 1979, pp. 612-613.
[12]A. Shamir, ‘‘How to share a secret,’’ Commum. ACM, vol. 22, Nov. 1979, pp. 612-613.
[13]C.-T. Li, and Y. Yuan, “Digital Watermarking Schemes for Multimedia Authentication,” Digital Watermarking for Digital Media, Idea Group Publishing, 2005, pp.30-51.
[14]D.-C. Lou, J.-L. Liu and C.-T. Li, “Digital Signature-based Image Authentication,” Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellecutal Property, Idea Group Publishing, 2004, pp. 207-230.
[15]D. Skraparlis, “Design of an Efficient Authentication Method for Modern Image and Video,” IEEE Transactions on Consumer Electronics, Vol. 49, 2003, pp. 417-426.
[16]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.1062-1078.
[17]C. Rey, and J.-L. Dugelay, “A Survey of Watermarking for Image Authentication,” EURASIP Journal on Applied Signal Processing, Vol. 6, 2002, pp. 613-621.
[18]E. T. Lin, C. I. Podilchuck, and E. J. Delp, “Detection of image alterations using semi-fragile watermarks,” Proceedings of SPIE Security and Watermarking of Multimedia Contents , Vol. 3971, 2000, pp. 152-163.
[19]Frank Hartung and Friedhelm Ramme, Ericsson Research, ”Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications,” IEEE Communications Magazine, 2000, Vol 38, Issue:11 .pp78 - 84.
[20]Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin, “Integration of Digital Rights Management into Learning Content Management System,” Proceedings of the International Conference on Information Technology: Coding and Computing ITCC(1), 2005, pp. 465-469.
[21]Willem Jonker and Jean-Paul Linnartz, “Digital rights management in consumer electronics products,” IEEE SIGNAL PROCESSING MAGAZINE, MARCH 2004,p82-91.
[22]Hunt, R.,”PKI and Digital Certification Infrastructure(2001),” Proceedings of the 9th IEEE International Conference on Networks,Bangkok, 2001,pp.234-239
[23]Seong Oun Hwang , Ki Song Yoon , Kyung Pyo Jun , Kwang Hyung Lee, “Modeling and implementation of digital rights,” Journal of Systems and Software, 2004,v.73 n.3, p.533-549.
[24]Claudine Conrado, Milan Petkovic, Michiel van der Veen,and Wytse van der Velde(2006),Controlled Sharing of Personal Content Using Digital Rights Management, Journal of Research and Practice in Information Technology, Vol. 38, No. 1, February 2006.
[25]Bellovin, S.M., Merritt, M., “Encrypted key exchange: password-based protocols secure against dictionary attacks,” In Proceedings of the IEEE Computer Society Conference (1992), pp. 72-84.
[26]Bresson, E., Chevassut, O., Pointcheval, D., “Security proofs for an efficient password-based key exchange,” Proceedings of the 10th ACM Conference on Computer and Communications Security (2003), pp. 241-250.
[27]Diffie, W., Hellman, M., “New directions in cryptography,” IEEE Transactions on Information Theory IT-22: 6 (1976), pp. 644-654.
[28]Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C., “Improvement of modified authenticated key agreement protocol,” Applied Mathematics and Computation 142: 2-3 (2003), pp. 305-308.
[29]ElGamal, T., “A public key cryptosystem and signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, IT-31 (4), 1985, pp. 469-472.
[30]Harn, L., “Group-oriented (t, n) threshold digital signature scheme and digital multi- signature,” IEE Proceedings Computers Digital Techniques, 141 (5), 1994, pp. 307-313.
[31]Hwang, S.J. and Chen, C.C., “New multi-proxy multi-signature schemes,” Applied Mathematics and Computation, 147 (1), 2004, pp. 57-67.
[32]Hwang, M.S., Lin, I.C. and Eric, J.L.L.U., “A secure nonrepudiable threshold proxy signature scheme with known signers,” Informatica, 11 (2), 2000, pp. 137-144.
[33]Sun, H.M., Lee, N.Y. and Hwang, T., “Threshold proxy signatures,” IEE Proceedings Computers Digital Techniques, 146 (5), 1999, pp. 254-261.
[34]Digital Rights Management White Paper Sonera Plaza Ltd MediaLab 2002.2. http//www.medialab.sonera.fi/workspace/DRMWhitePaper.pdf
[35]Yan, Z.”Mobile Digital Rights Management,”Nokia Research Center,In Telecommunications Software and Multimedia TML-C7 ISSN 1455-9749,2001.www.tml.hut.fi/Studies/T-110.501/2001/papers/zheng.yan.pdf