支持DRM的数字产品发行相关技术的研究与实践作者:程巍学位授予单位:复旦大学参考文献(46条)1.XrML2.0TechnicalOverview20022.HGuoDigitalRightsManagementusingXrML20013.TheMPEG-21RightsExpressionLanguage-AwhitePaperTechnicalreport20034.RIannellaOpenDigitalRightsLanguage(ODRL)Version1.120025.查看详情6.查看详情7.查看详情8.查看详情9.查看详情10.RumpNCandigitalrightsmanagementbestandardized?2004(02)11.GeerDDigitalrightstechnologysparksinteroperabilityconcerns2004(12)12.RKoenen.JLacy.MMacKay.SMitchellTheLongMarchtoInteroperableDigitalRightsManagement200413.Bok-NyongPark.Jae-WonKim.WonjunLeePrecePt:aprivacy-enhancinglicensemanagementprotocolfordigitalrightsmanagement200414.SekiA.KameyamaWAproposalonopenDRMsystemcopingwithbothbenefitsofrights-holdersandusers200315.GunheeKim.DongkyooShin.DongilShinAnefficientmethodologyformultimediadigitalrightsmanagementonmobilehandset2004(04)16.JonkerW.LinnartzJ-PDigitalrightsmanagementinconsumerelectronicsproducts2004(02)17.HyeJooLee.BumSukChoi.JongWonSeok.JinWooHongDesignofprotectionanddistributionservicemodelfordigitalbroadcastingcontent200418.IwataT.AbeT.UedaK.SunagaHADRMsystemsuitableforP2Pcontentdeliveryandthestudyonitsimplementation200319.WenboMaoModernCryptography:TheoryandPractice200420.WadeTrappe.LawrenceCWashingtonIntroductiontoCRYPTOGRAPHYwithCODINGTHEORY200421.WilliamStallingsCryptographyandNetworkSecurityPrinciplesandPracticesecondEdition200122.查看详情23.WDiffie.MHellmanMultiusercryptographictechniques197624.WDiffie.MHellmanNewdirectionsincryptography1976(06)25.LawrenceEBasshamⅢEfficiencyTestingofANSICImplementationsofRound1CandidateAlgorithmsfortheAdvancedEncryptionStandard199926.WeiDaiCrypto++5.2.1Benchmarks27.IntelCorporationUsingtheRDTSCInstructionforPerformanceMonitoring199728.ScottFluhrer.ItsikMantin.AdiShamirWeaknessesintheKeySchedulingAlgorithmofRC429.HelgerLipmaa.hillipRogaway.avidWagnerCommentstoNISTconcerningAESModesofOperations:CTR-ModeEncryption30.RHousleyUsingAdvancedEncryptionStandard(AES)CounterModeWithIpsecEncapsulatingSecurityPayload(ESP)31.DougWhiting.RussHousley.NielsFergusonSubmissiontoNIST:CounterwithCBC-MAC(CCM)AESModeofOperation32.JesseWalker802.11SecuritySeriesPartⅢ:AES-basedEncapsulationsof802.1133.NutzelJ.GrimmRPotatoSystemandsignedmediaformatanalternativeapproachtoonlinemusicbusinessWebDeliveringofMusic200334.MarkStampDigitalRightsManagement:TheTechnologyBehindtheHype35.XingWangDigitalRightsManagementforBroadbandContentDistribution36.AOWaller.GJones.TWitley.JEdwardsDKaleshiAMunroBMacfarlaneAWoodSecuringthedeliveryofdigitalcontentovertheInternet200237.BoazBarak.OdedGoldreich.RussellImpagliazz.StevenRudich,AmitSahai,SalilVadhan,KeYangOnthe(Im)possibilityofObfuscatingPrograms.ElectronicColloquiumonComputationalComplexity200138.ChristianCollberg.ClarkThomborson.DouglasLowAtaxonomyofobfuscatingtransformation199739.ChristianCollberg.ClarkThomborson.DouglasLowBreakingabstractionsandUnstructuringDataStructures40.ChenxiWangASecurityArchitectureforSurvivabilityMechanisms200041.BarniM.BartoliniFDatahidingforfightingpiracy2004(02)42.黄德华软件综合防伪及电子网络注册系统研究[学位论文]硕士200443.顾国飞基于P2P模式的入侵容忍的数字内容保护技术研究[学位论文]硕士200344.秦晓凌流媒体数字版权管理系统的设计与实现[学位论文]硕士200445.吴建军恶意主机环境下的移动代码保护——非交互保密函数计算、代码混淆和软件水印技术研究[学位论文]博士200446.程巍.龚黎云.高传善数字版权管理的相关安全技术和实现方案[期刊论文]-微型电脑应用2004(2)相似文献(1条)1.会议论文张新鹏.王朔中.陈超不需权威第三方的非对称指纹方案2006基于RSA公钥体制提出一种不需权威第三方的非对称指纹方案.含有指纹的版本必须在数字产品发行商和用户的共同参与下才能产生,而且发行商无法得到含指纹版本.当发行商指控某用户非法复制了含指纹数字产品时,他可根据非法复制的产品得出其中所含指纹,并与用户共同生成一组测试信号,其中仅有一个含有正确的指纹.如发行商能在众多测试信号中选出含有指纹的信号,指控就能成立,故无需第三方参与便实现了数字指纹鉴定.在整个过程中发行商和用户都不必泄露自己的机密,因此不会构成对双方权益的潜在威胁.本文链接:授权使用:上海海事大学(wflshyxy),授权号:0e1f520b-051a-4cfe-acee-9e0800d50e5c下载时间:2010年10月7日