Riferimenti

[1]   Ripley, Traw, Balogh, Reed.

“Content Protection in the Digital Home”.

Intel Technology Journal, Vol. 6, No. 4, november 2002. pp 48-57.

 

[2]   Traw.

“Protecting Digital Content within the Home”.

         IEEE Magazine, Vol. 87, No. 7, July 1999. pp 1267-1276.

 

[3]   Marks, Tumbull.

“Technical Protection Mesaures: The Intersection of Technology, Law, and Commercial Licenses”.

         Workshop on Implementation Issues of the WIPO Copyright Treaty

         and the WIPO Performances and Phonograms Treaty.

         World Intellectual Property Organization, Geneve, Switzerland, 1999.

 

[4]   Lotspiech, Nusser, and Pestoni.

        “Broadcast Encryption’s Bright Future”.

          IEEE Computer, Vol. 35, No. 8, August 2002. pp. 57-63.

 

[5]   Data Hiding Subgroup (DHSG).

[Online]. http://www.dvcc.com/dhsg

 

[6]    “Official call for proposals, digital transmission discussion group”.

        CPTWG Meeting, March 1997, Burbank, CA.

        [Online]. http://www.dvcc.com/cptwg/dtdfp10.pdf

 

[7]    Digital Transmission Discussion Group Copy Protection Technical Working Group.

        [Online]. http://www.dvcc.com/cptwg/dtdgr10.pdf

 

[8]   5C. Digital Trasmission Content Protection, white paper, version 1.0.

        [Online]. http://www.dtcp.com

 

[9]    “Standard for Public Key Cryptography”.

        IEEE Standard, P. 1363, 2000.

 

[10]   Cox, Linnartz.

         “Some general methods for tampering with watermarks”.

         IEEE J. Select. Areas Commun., Vol. 16, May 1998. pp 587-593

 

[11]   Hernandez, Pérez-Gonzalez, Rodriguez, Nieto.

          “Performance analysis of a 2-D-multipulse amplitude modulation scheme

           for data hiding and watermarking of still images”

              IEEE J. Select. Areas Commun., Vol. 16, May 1998. pp 510-524

 

[12]   Baurer.

          “Decrypted Segrets: Methods and Maxims of Cryptology”

          Springer-Verlag. Berlin Heidelberg. 2000

 

[13]   DVD Copy Control Association.

          [Online]. http://www.dvdcca.org/dvdcca/faq.html

 

[14]   Golic.

         “Cryptoanalysis of Alleged A5 Stream Cipher”.

         presentato a Eurocrypt ‘97.

 

[15]   “Caratteristiche tecniche dei DVD” e "Macrovision".

         [Online]. http://www.dvditalia.it

 

[16]   “General DVD information”.

         [Online]. http://www.gilc.org/speech/DVD-CSS.htm

 

[17]   “MPEG information”.

         [Online]. http://www.mpeg.org/MPEG/starting-points.html#mpeg

 

[18]   “Region Codes”.

         [Online]. http://www.opendvd.org/regioncode.php3

 

[19]   “UDF information”.

         [Online]. http://www.osta.org/html/ostatech.html#udf

 

[20]   Schneier.

         “Applied Cryptography”

         Second Edition. Katherine Schowalter. pp 372-379

 

[21]   Schneier.

         “Security in the Real World: How to Evaluate Security Tecnology”.

         Computer Security Journal. Vol. XV, No. 4, 1999

 

[22]   Stevenson.

         “Cryptoanalysis of Content Scrambling System”

         [Online]. http://crypto.gq.nu

 

[23]   Kesden.

“Content Scambling System”

         [Online]. http://www.mellon_university.com/people/Kesden/CSS.ppt

 

[24]    Satoh, Takano.

         “A Scalable Dual-Field Elliptic Curve Cryptographic Processor”

         IEEE Transactions on Computers. Vol. 52, No. 4, April 2003

 

[25]    4C Entity.

         Whitepaper

          [Online] http://www.4Centity.com