A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents
暂无分享,去创建一个
[1] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[2] Dan Boneh,et al. Hardware Support for Tamper-Resistant and Copy-Resistant Software , 2000 .
[3] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[4] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[5] Barbara G. Ryder,et al. Complexity of Points-To Analysis of Java in the Presence of Exceptions , 2001, IEEE Trans. Software Eng..
[6] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[7] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[8] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .