Tài liệu tham khảo |
Loại |
Chi tiết |
[2] infoMarket Business Development Group, Cryptolope Containers, technical re- port, International Business Machines Corporation, 1997 |
Sách, tạp chí |
Tiêu đề: |
Cryptolope Containers |
Tác giả: |
infoMarket Business Development Group |
Nhà XB: |
International Business Machines Corporation |
Năm: |
1997 |
|
[3] ContentGuard, eXtensible rights Markup Language (XrML) Core 2.1 Specification, White Paper, ContentGuard Holdings, 2002 |
Sách, tạp chí |
Tiêu đề: |
eXtensible rights Markup Language (XrML) Core 2.1 Specification |
|
[5] Hitachi, Ltd., et al., Digital Transmission Content Protection Specification, version 1.2, July 2001 (informational version) |
Sách, tạp chí |
Tiêu đề: |
Digital Transmission Content Protection Specification |
|
[7] NIST, Digital Signature Standard, National Institute of Standards and Technology, Gaithersburg, MD, May 1994 |
Sách, tạp chí |
Tiêu đề: |
Digital Signature Standard |
|
[8] NIST, Data Encryption Standard (DES), National Institute of Standards and Tech- nology, Gaithersburg, MD, October 1999. Supersedes FIPS PUB 46-2 (1993) |
Sách, tạp chí |
Tiêu đề: |
Data Encryption Standard (DES) |
Tác giả: |
NIST |
Nhà XB: |
National Institute of Standards and Technology |
Năm: |
1999 |
|
[9] Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wire- tap Politics & Chip Design, Sebastopol, CA: O’Reilly & Associates, 1998 |
Sách, tạp chí |
Tiêu đề: |
Cracking DES: Secrets of Encryption Research, Wire-tap Politics & Chip Design |
|
[10] Kelsey, J., B. Schneier, and D. Wagner, “Mod n Cryptanalysis, with Applications Against RC5P and M6,” in L. Knudsen, (ed.), Fast Software Encryption: 6th Inter- national Workshop (FSE ’99), Springer Verlag: Rome, March 1999, pp. 139–155 |
Sách, tạp chí |
Tiêu đề: |
Mod"n"Cryptanalysis, with ApplicationsAgainst RC5P and M6,” in L. Knudsen, (ed.),"Fast Software Encryption: 6th Inter-national Workshop (FSE ’99) |
|
[11] Intel Corporation, High-Bandwidth Digital Content Protection System, version 1.0, February 2000 (informational version) |
Sách, tạp chí |
Tiêu đề: |
High-Bandwidth Digital Content Protection System |
|
[12] Crosby, S., et al., “A Cryptanalysis of the High-Bandwidth Digital Content Pro- tection System,” in T. Sander, (ed.), Security and Privacy in Digital Rights Manage- ment: ACM CCS-8 Workshop DRM 2001, Vol. 2320, Heidelberg, Germany: Springer Verlag, 2002, pp. 192–200 |
Sách, tạp chí |
Tiêu đề: |
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001 |
Tác giả: |
Crosby, S., et al |
Nhà XB: |
Springer Verlag |
Năm: |
2002 |
|
[13] Compaq Computer Corporation, et al., Trusted Computing Platform Alliance (TCPA) Main Specification, version 1.1b, February 2002 |
Sách, tạp chí |
Tiêu đề: |
Trusted Computing Platform Alliance (TCPA)Main Specification |
|
[14] Arbaugh, W., “Improving the TCPA Specification,” IEEE Computer, Vol. 35, No. 8, August 2002, pp. 77–79 |
Sách, tạp chí |
Tiêu đề: |
Improving the TCPA Specification |
Tác giả: |
W. Arbaugh |
Nhà XB: |
IEEE Computer |
Năm: |
2002 |
|
[15] Anderson, R., “Security in Open Versus Closed Systems—The Dance of Boltz- mann, Coase and Moore,” Proceedings of Open Source Software: Economics, Law and Policy, Toulouse, France, June 2002 |
Sách, tạp chí |
Tiêu đề: |
Security in Open Versus Closed Systems—The Dance of Boltz-mann, Coase and Moore,”"Proceedings of Open Source Software: Economics, Law andPolicy |
|
[17] ISO/IEC Joint Technical Committee 1 Subcommittee 27 Working Group 3:Security Evaluation Criteria, Information Technology—Security Techniques—Evaluation Criteria for IT Security—Part 1: Introduction and General Model, ISO/IEC 15408-1, December 1999, version 2.1 |
Sách, tạp chí |
Tiêu đề: |
Information Technology—Security Techniques—"Evaluation Criteria for IT Security—Part 1: Introduction and General Model |
|
[18] ISO/IEC Joint Technical Committee 1 Subcommittee 27 Working Group 3:Security Evaluation Criteria, Information Technology—Security Techniques—Evaluation Criteria for IT security—Part 2: Security Functional Requirements, ISO/IEC 15408-2, December 1999, version 2.1 |
Sách, tạp chí |
Tiêu đề: |
Information Technology—Security Techniques—"Evaluation Criteria for IT security—Part 2: Security Functional Requirements |
|
[19] ISO/IEC Joint Technical Committee 1 Subcommittee 27 Working Group 3:Security Evaluation Criteria, Information Technology—Security Techniques—Evaluation Criteria for IT Security—Part 3: Security Functional Requirements, ISO/IEC 15408-3, December 1999, version 2.1 |
Sách, tạp chí |
Tiêu đề: |
Information Technology—Security Techniques—Evaluation Criteria for IT Security—Part 3: Security Functional Requirements |
Tác giả: |
ISO/IEC Joint Technical Committee 1 Subcommittee 27 Working Group 3 |
Năm: |
1999 |
|
[20] Reynolds, F., and J. Heller, “Kernel Support for Network Protocol Servers,”Proceedings of the USENIX Mach Symposium, Monterey, CA, November 1991, pp. 149–162 |
Sách, tạp chí |
Tiêu đề: |
Kernel Support for Network Protocol Servers,”"Proceedings of the USENIX Mach Symposium |
|
[21] Jones, M. B., “Interposition Agents: Transparently Interposing User Code at the System Interface,” ACM Operating Systems Review, Vol. 27, No. 5, December 1993, pp. 80–93 |
Sách, tạp chí |
Tiêu đề: |
Interposition Agents: Transparently Interposing User Code at theSystem Interface,”"ACM Operating Systems Review |
|
[22] Busch, C., et al., “A System for Intellectual Property Protection,” Proceedings of the World Multiconference on Systemics, Cybernetics, and Informatics (SCI 2000)/In- ternational Conference on Information Systems Analysis and Synthesis (ISAS 2000), Orlando, FL, July 2000, pp. 225–230 |
Sách, tạp chí |
Tiêu đề: |
A System for Intellectual Property Protection,”"Proceedingsof the World Multiconference on Systemics, Cybernetics, and Informatics (SCI 2000)/In-ternational Conference on Information Systems Analysis and Synthesis (ISAS 2000) |
|
[23] Rademer, E., and S. Wolthusen, “Transparent Access to Encrypted Data Using Operating System Network Stack Extensions,” in R. Steinmetz, J. Dittman, and M. Steinebach, (eds.), Communications and Multimedia Security Issues of the New Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on Com- munications and Multimedia Security (CMS’01), Darmstadt, Germany, May 2001, pp. 213–226 |
Sách, tạp chí |
Tiêu đề: |
Communications and Multimedia Security Issues of the New Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) |
Tác giả: |
Rademer, E., S. Wolthusen |
Nhà XB: |
R. Steinmetz |
Năm: |
2001 |
|
[24] Busch, C., and S. Wolthusen, “Tracing Data Diffusion in Industrial Research with Robust Watermarking,” in J.-L. Dugelay and K. Rose, (eds.), Proceedings of the 2001 Fourth Workshop on Multimedia Signal Processing (MMSP’01), Cannes, October 2001, pp. 207–212 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2001 Fourth Workshop on Multimedia Signal Processing (MMSP’01) |
Tác giả: |
C. Busch, S. Wolthusen |
Nhà XB: |
J.-L. Dugelay |
Năm: |
2001 |
|