References
- Kevin Mandia, Chris Prosise, Matt Pepe, “Incident response and computer forensic, Second Edition,” McGraw-Hill, 2003.
- Warren G, Kruse II, Jay G.Heiser, “COMPUTER forensic: Incident Response Essentials,” Addison Wesley, 2001.
- Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, “Digital rights management for content distribution,” AISW2003, 2003.
- OMA, “OMA DRM Requirements Version 2.0,” 2004.
- MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11 N5231, Shanghai, 2002.
- DMP, “TIRAMISU(IST-2003-506983) DRM Requirements,” 2004.
- RFC 3227, “Guidelines for Evidence Collecting and Archiving,” http://www.faqs.org/rfcs/rfc3227-.html. 2002.
- Mariusz Burdach, “Forensic Analysis of a Live Linux System I,” http://www.securityfocus.com/infocus/1769. 2004.
- Mariusz Burdach, “Forensic Analysis of a Live Linux System II,” http://www.securityfocus.com/infocus/1773 , 2004.
- Seok-Hee Lee, “A Study of Memory Information Collection and Analysis in a view of Digital forensic in Window System,” Center for Information Technologies, Korea University, 2006. 2.
Cited by
- Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography vol.2015, 2015, https://doi.org/10.1155/2015/807213
- An enhanced security framework for reliable Android operating system vol.9, pp.6, 2016, https://doi.org/10.1002/sec.908