[1]
Ripley, Traw, Balogh, Reed.
“Content Protection in the
Digital Home”.
Intel Technology Journal, Vol. 6,
No. 4, november 2002. pp 48-57.
“Protecting Digital Content
within the Home”.
IEEE Magazine, Vol. 87, No. 7, July 1999. pp 1267-1276.
“Technical Protection Mesaures:
The Intersection of Technology, Law, and Commercial Licenses”.
Workshop on Implementation Issues of the WIPO Copyright Treaty
and the WIPO Performances and Phonograms Treaty.
World Intellectual Property Organization, Geneve, Switzerland, 1999.
[4]
Lotspiech, Nusser, and Pestoni.
“Broadcast Encryption’s Bright Future”.
IEEE
Computer, Vol. 35, No. 8, August 2002. pp. 57-63.
[5]
Data Hiding Subgroup (DHSG).
[Online].
http://www.dvcc.com/dhsg
[6]
“Official call for proposals, digital transmission discussion group”.
CPTWG Meeting, March 1997, Burbank, CA.
[Online]. http://www.dvcc.com/cptwg/dtdfp10.pdf
[7]
Digital Transmission Discussion Group Copy Protection Technical Working Group.
[Online]. http://www.dvcc.com/cptwg/dtdgr10.pdf
[8]
5C. Digital Trasmission Content
Protection, white paper, version 1.0.
[Online]. http://www.dtcp.com
[9]
“Standard for Public Key Cryptography”.
IEEE Standard, P. 1363, 2000.
“Some general methods for
tampering with watermarks”.
IEEE J. Select. Areas Commun.,
Vol. 16, May 1998. pp 587-593
[11]
Hernandez, Pérez-Gonzalez, Rodriguez,
Nieto.
“Performance analysis of a 2-D-multipulse
amplitude modulation scheme
for data hiding and watermarking of still
images”
IEEE J. Select. Areas Commun., Vol. 16, May 1998. pp 510-524
“Decrypted Segrets: Methods and Maxims of Cryptology”
Springer-Verlag.
Berlin Heidelberg. 2000
[13]
DVD Copy Control Association.
[Online]. http://www.dvdcca.org/dvdcca/faq.html
“Cryptoanalysis of Alleged A5
Stream Cipher”.
presentato a Eurocrypt ‘97.
[15]
“Caratteristiche tecniche dei DVD” e
"Macrovision".
[Online]. http://www.dvditalia.it
[16]
“General DVD information”.
[Online]. http://www.gilc.org/speech/DVD-CSS.htm
[Online]. http://www.mpeg.org/MPEG/starting-points.html#mpeg
[Online]. http://www.opendvd.org/regioncode.php3
[Online]. http://www.osta.org/html/ostatech.html#udf
“Applied
Cryptography”
Second Edition. Katherine
Schowalter. pp 372-379
“Security in the Real World: How
to Evaluate Security Tecnology”.
Computer Security Journal. Vol.
XV, No. 4, 1999
“Cryptoanalysis of Content
Scrambling System”
[Online]. http://crypto.gq.nu
“Content Scambling System”
[Online]. http://www.mellon_university.com/people/Kesden/CSS.ppt
“A Scalable Dual-Field
Elliptic Curve Cryptographic Processor”
IEEE Transactions on
Computers. Vol. 52, No. 4, April 2003
Whitepaper
[Online] http://www.4Centity.com