-
1
-
-
84877628849
-
-
Apple iTunes. http://www.apple.com/itunes.
-
Apple iTunes
-
-
-
2
-
-
57149138480
-
-
Microsoft Windows DRM
-
Microsoft Windows DRM. http://www.microsoft.com/windows/windowsmedia/drm.
-
-
-
-
3
-
-
57149134577
-
-
B. Cohen. Incentives Build Robustness in BitTorrent. Workshop on Economics of P2P Systems, 2003.
-
B. Cohen. Incentives Build Robustness in BitTorrent. Workshop on Economics of P2P Systems, 2003.
-
-
-
-
4
-
-
0003584029
-
-
Federal Information Processing Standards, FIPS PUB
-
Federal Information Processing Standards. Security Requirements for Cryptographic Modules. FIPS PUB 140-2, 2002.
-
(2002)
Security Requirements for Cryptographic Modules
, pp. 140-142
-
-
-
5
-
-
0008321437
-
Standard specifications for public key cryptography. IEEE,
-
IEEE 1363-2000
-
IEEE 1363-2000. Standard specifications for public key cryptography. IEEE, 2000.
-
(2000)
-
-
-
6
-
-
57149134302
-
-
Weedshare Inc
-
Weedshare Inc. http://www.weedshare.com.
-
-
-
-
7
-
-
57149139483
-
Redistribution of Rights-Managed Content and Technique for Encouraging Same
-
US Patent No. 10/326678
-
J. Beezer, et al. Redistribution of Rights-Managed Content and Technique for Encouraging Same. US Patent No. 10/326678.
-
-
-
Beezer, J.1
-
8
-
-
0003293531
-
Free riding on Gnutella
-
E. Adar and B. Huberman. Free riding on Gnutella. First Monday, Vol.5, no. 10, 2000.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Huberman, B.2
-
9
-
-
84949478858
-
Incentives for sharing in P2P networks
-
P. Golle, et al. Incentives for sharing in P2P networks. ACM Electronic Commerce, pp.75-87, 2001.
-
(2001)
ACM Electronic Commerce
, pp. 75-87
-
-
Golle, P.1
-
10
-
-
3242802867
-
-
M. Feldman, et al. Robust Incentive Techniques for P2P Networks. ACM EC, pp.102-11, 2004.
-
M. Feldman, et al. Robust Incentive Techniques for P2P Networks. ACM EC, pp.102-11, 2004.
-
-
-
-
11
-
-
57149144583
-
-
T.-W. Ngan, et al. Enforcing Fair Sharing of P2P Resources. Int. Workshop on P2P Systems, 2003.
-
T.-W. Ngan, et al. Enforcing Fair Sharing of P2P Resources. Int. Workshop on P2P Systems, 2003.
-
-
-
-
13
-
-
57149140792
-
-
The Digital Millennium Copyright Act of 1998. U.S. Copyright Office Summary, 1998.
-
The Digital Millennium Copyright Act of 1998. U.S. Copyright Office Summary, 1998.
-
-
-
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, et al. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
-
15
-
-
57149132742
-
-
T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at
-
T. Dierksa and C. Allen. The TLS Protocol Version 1.0. Internet draft, 1999. On-line at: http://ietf.org/rfc/rfc2246.txt.
-
-
-
-
18
-
-
57149124412
-
-
nCipher Technologies Inc
-
nCipher Technologies Inc. http://www.ncipher.com/technologies.
-
-
-
-
19
-
-
57149136391
-
-
SafeNet Inc
-
SafeNet Inc. http://www.safenet-inc.com/products/tokens/products-sc-330. asp.
-
-
-
-
20
-
-
57149131457
-
-
Infineon Technologies AG
-
Infineon Technologies AG. http://www.infineon.com.
-
-
-
-
21
-
-
57149133869
-
-
Axalto Inc
-
Axalto Inc. http://www.axalto.com.
-
-
-
-
22
-
-
57149126153
-
-
Gemplus Inc
-
Gemplus Inc. http://www.gemplus.com/smart/rd/publications.
-
-
-
-
25
-
-
34547628067
-
-
University Of Auckland, Department of Management Science and Information Systems, working paper, 2005
-
J. Paynter and P. Law. An arms length evaluation of Octopus. University Of Auckland, Department of Management Science and Information Systems, working paper, 2005.
-
An arms length evaluation of Octopus
-
-
Paynter, J.1
Law, P.2
|