|
[1]陳育毅,蔡柏宏,詹進科,”建立家庭網路與個人合理使用的誇平台數位產權管理機制”,2005商管與資訊研討會論文集, PP. (Sect IV) 11-24. [2]陳育毅、詹進科、紀宥宇, 具合理使用的家庭數位內容共享機制, 第十八屆全國資訊安全會議(Proceedings of the 18th Information Security Conference), May 29-30, 2008. [3]"中華民國著作權法", http://www.tipo.gov.tw/copyright/copyright_law/copyright_law_95.asp [4]G. Ateniese, S. Hohenberger, “Proxy Re-Signatures: New Definitions, Algorithms, and Applications”, ACM CCS’2005. [5]B. Cohen. “Incentives build robustness in bittorrent”, In Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems. http://www.bittorrent.com/bittorrentecon.pdf, 2003. [6]D. Choi, Y. Lee, H. Kang, S. Kim, and D. Won, “An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.” Autonomic and Trusted Computing, LNCS 4610, pp.135-146, 2007. [7]S. van den Heuval, W. Jonker, F. Kamperman, and P. Lenoir, “Secure Content Management in Authorized Domains.” In: Proc. IBC, pp. 467–474, 2002. [8]T. Iwata, T. Abe, K. Ueda, H. Sunaga, "A DRM system suitable for P2P content delivery and the study on its implementation" Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on Volume 2. [9]T. Kalker, D H J. Epema “Music2Share-Copyright-Compliant Music Sharing in P2P System” , In Proceedings of the IEEE. Date: 2004. Volume: 92. [10]Xiaosong Lou, Kai Hwang, Runfang Zhou, “ Integrated Copyright Protection in Peer-to-Peer Networks”, Distributed Computing Systems Workshops, 2007. ICDCSW ''07. 27th International Conference on 22-29 June 2007 Page(s):28 – 28. [11]Yun-kyung Lee, Jong-wook Han, and Kyo-il Chung, “ Home Device Authentication Method in Ubiquitous Environment.” , IEEE International Symposium on 20-23 June Page(s):1 – 5, 2007. [12]Yun-kyung Lee, Deok Gyu Lee, and Jong-wook Han, “Home Device Authentication Method Based on PKI.” FGCN, pp. 7-11, 2007. [13]D.K. Mulligan, J. Han, and A.J. Burstein, "How DRM-Based Content Delivery Systems Disrupt Expectations of Personal Use", ACM DRM 2003, Washington D.C., USA, October 27, 2003, pp.77-89. [14]B. C. Popescu, F. L. A. J. Kamperman, B. Crispo, and A. S. Tanenbaum, “A DRM security architecture for home networks.” In Proceedings of the 4th ACM workshop on Digital Rights Management, pages 1–10, 2004. [15]M. Ripley, and C. Traw, “Content Protection in the Digital Home.”, Intel Technology Journal, Vol. 6, Issue 4, 2002. [16]Jae-Youn Sung, Jeong-Yeon Jeong, Ki-Song Yoon, “DRM Enabled P2P Architecture” Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference On page(s): 487- 490. [17]S. Sovio, N. Asokan, and K. Nyberg, “Defining Authorization Domains Using virtual Devices.” In: SAINT Workshops, pp. 331–336, 2003. [18]A. Sui, Y. Wang, R. Lu, C Yang – Swarm, “A Trust Model based DRM technology on Distributed P2P and IPv6 Networks” Intelligence Symposium, 2007. [19]X. Shangqin, L. Zhengding, L. Hefei, Z. Fuhao, “ A Trust Scheme Based DRM Model for P2P System”, Wuhan University Journal of Natural Sciences, 2006. [20]Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang, and Ravi Sandhu, “Towards Digital Rights Protection in BitTorrent-like P2P Systems”, in the 15th SPIE/ACM Multimedia Computing and Networking (MMCN), San Jose, CA USA, January 30-31, 2008 [21]DVB technical module sub-group on Copy Protection Technologies. Call for Proposals for Content Protection & Copy Management technologies. TM2549, DVB-CPT rev. 1.2, July 2001 [22]FairPlay: Effectiveness and Weaknesses of Apple’s Digital Right Management Technology", http://e170.ex.com/p1/indigo.pdf [23]IDC http://www.idc.com/ [24]IBM, EMMS, http://www-306.ibm.com/software/data/emms/ [25]Jeffrey Dambrtowski, "InterTrust''s Role in Information Assurance for Digital Media", http://www.acsu.buffalo.edu/~jwd/MGS602project/intertrust.shtml, Nov. 20, 2003. [26]Microsoft,"Windows Media Digital Rights Management", http://www.microsoft.com/windows/windowsmedia/tw/drm/default.aspx [27]National Institute of Standards and Technology http://www.nist.org [28]RealNetworks, RealSystem Media Commerce Suite Technical White Paper, http://docs.real.com/docs/drm/DRM_WP1.pdf
|