Digital Rights Management: The Technology Behidn The Hype
暂无分享,去创建一个
[1] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[2] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[3] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[4] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[5] Andrew Odlyzko,et al. The Rise and Fall of Knapsack Cryptosystems , 1998 .
[6] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[7] Min Wu,et al. Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.
[8] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[9] Amit Sahai,et al. On the (im)possibility of obfuscating programs : (Extended abstract) , 2001, CRYPTO 2001.
[10] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[11] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[12] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.
[13] Tomas Sander. Security and Privacy in Digital Rights Management : ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers , 2002, CCS 2002.
[14] J. Casti. The One True Platonic Heaven: A Scientific Fiction on the Limits of Knowledge , 2003 .