References
- 두소영, 공은배, '인터넷 상에서 전달되는 디지털 정보의 권한 관리 기술', 제10회 정보보호와 암호에 관한 학술대회, pp.19-25, 1998
- H.M.Gladney, 'Access Control for Large Collections,' ACM Transactions on Information Systems, vol.15, No.2, pp.l54-194, 1997 https://doi.org/10.1145/248625.248652
- InterTrust, 'Securing the Content, Not the Wire, for Information,' URL: http://www.intertrust.com/technology/stc.html
- Mark Stefik, 'Letting Loose the Light: Igniting Commerce in Electronic Publication,' Xerox Palo Alto Research Center, Palo Alto, CA, 1995
- Mark Stefik, 'The Digital Property Rights Language. Manual and Tutorial. Version 1.02,' Xerox Palo Alto Research Center, Palo Alto, CA, 1996
- R. Martin Roscheisen, 'A Network-Centric Design For Relationship-Based Rights Management,' Stanford Univ., URL:http://pcd.stanford.edu/rmr/dissertation.pdf, 1997
- A.K.Choudhury, N.F.Maxemchuk and S.Paul, H.G.Schulzrinne, 'Copyright Protection for Electronic Publishing over Computer Networks,' IEEE Network Magazine, pp.12-20, 1994 https://doi.org/10.1109/65.386048
- Bennet Yee, 'Using Secure Coprocessors,' CMU-CS-94-149, 1994
- A.Fiat, M.Naor,'Broadcast Encryption,' CRYPTO'93, pp.480-491. 1994
- B.Chor, A.Fiat and M.Naor, 'Tracing Traitors,' CRYPTO'94 LNCS 839, pp.257-270, 1994
- Birgit Pfitzman, 'Trails of Traced Traitors,' Information Hiding, LNCS 1174, pp.49-64, 1996
- Cynthia Dwork, Jeffrey Lotspiech and Moni Naor, 'Digital Signets: Self-Enforcing Protection Digital Information,' 28th Symposium on Theory of Computing, pp.489-498, 1996 https://doi.org/10.1145/237814.237997
- Kaoru Kurosawa and Yvo Desmedt, 'Optimum Traitor Tracing and Asymmetric Schemes,' EUROCRYPT '98, LNCS 1403, pp.l45-157, 1998
- Bruce Schneier, Applied Cryptography, pp.758, WILEY, 1996
- Gary N.Griswold, 'Method for Protecting Copyright on Networks,' http://www.cni.org/docs/ ima.ip-workshop/Griswold.html, 1993
- Birgit Pfitzmann and Matthias Schunter, 'Asymmetric Fingerprinting,' EUROCRYPT'96, LNCS 1070, pp.84-95, 1996
- Birgit Pfitzmann and Matthias Schunter, 'Asymmetric Fingerprinting for Larger Collusions,' 4th ACM Conf. On Computer and Communications Security, pp.l51-160, 1997 https://doi.org/10.1145/266420.266453
- Dan Boneh and James Shaw, 'Collusion-Secure Fingerprinting for Digital Data,' CRYPTO'95, LNCS 963, pp.452-465, 1995
- Nasir Memon and Ping Wah Wong, 'Protecting Digital Media Content,' Communications of the ACM, Vo1.41, No.7, pp.35-43, 1998 https://doi.org/10.1145/278476.278485
- Amir Herzberg and Shlomit S. Pinter, 'Public Protection of Software,' ACM Transactions on Computer Systems,' Vo15, No.4, pp.371-393, 1987 https://doi.org/10.1145/29868.29872
- Oded Goldreich and Rafail Ostrovsky, 'Software Protection and Simulation on Oblivious RAMs,' Journal of the ACM, Vo1.43, No.3, pp.431-473, 1996 https://doi.org/10.1145/233551.233553
- David Aucsmith, 'Tamper resistant software: An Implementation, In Ross Anderson, editor Information Hiding,' First International Workshop, May/June 1996, LNCS 1174, pp.317-333, 1996 https://doi.org/10.1007/3-540-61996-8_49
- Douglas R. Stinson, Cryptography Theory and Practice, pp.434, CRC Press, 1995