[1]. |
Workpackage 1: Access Control and Copyright Protection
for Images needs evaluation, ACCOPI RACE project M1005, Universite Catholique
de Louvain (UCL), June 1995 |
[2] |
Cryptology for digital TV broadcasting, B. Macq and J.-J.
Quisquater, Proceedings of the IEEE, Vol. 83, No. 6, June 1995 |
[3] |
An overview of security in Eurocrypt conditional access
system, E.Cruselles, J.L. Melus and M. Soriano, Applied Mathematics and
Telematics Department, Polytechnic University of Catalonia, IEEE 1993 |
[4] |
A single conditional access system for satellite-cable
and terrestrial TV, F. Coutrot, V. Michon, Centre Commun d'Etudes de Telediffusion
et Telecommunication Cesson Sevigne, France, IEEE Transactions on Consumer
Electronics, Vol. 35, No. 3., August 1989 |
[5] |
Satellite scrambling methods, M.Jackson, WWW-pages of Physical
and Theoretical Chemistry Lab, Oxford University, 1995 |
[6] |
Satellite TV Frequently Asked Qustions List, Gary Bourgois,
Newsgroup: rec.video.satellite.misc, 29 August 1995 |
[7] |
Phrack Magazine, Volume Six, Issue Forty-Seven, File 16
of 22 |
[8] |
Scrambling News- US. DBS Hackers Encounter Code 99: Part
1, David Lawson, Newsgroup: alt.satellite.tv.crypt, 16 July 1995 |
[9] |
Workpackage 3: ACCOPI Evaluation of Existing Systems, ACCOPI
RACE project M1005, 19 April 1995 |
[10] |
Some technical details about Videocrypt, Markus Kuhn, WWW-pages
of Computer Science University of Erlangen, Germany, 2 August 1994 |
[11] |
Videcrypt, An Overview, Darren Ingram, author of Satnews,
14 May 1991 |
[12] |
Satellite Piracy - The European Experience & NanoCommands
Disappear - 0A Launch Imminent? John McCormac, WWW-pages of Hack Watch
News, Piracy On The Final Frontier 1995 |
[13] |
Scrambling News- US. DSS Hackers Encounter Code 99: Part
2, David Lawson, Newsgroup: alt.satellite.tv.crypt, 16 July 1995 |
[14] |
Has DSS Been Hacked?, John McCormac, WWW-pages of Hack
Watch News, Piracy On The Final Frontier 1995 |
[15] |
Implementation guidelines for the use of MPEG2 and content
input to servers, DAVIC second call for proposals, CCETT |
[16] |
Common Interface Specification for Conditional Access and
other Digital Video Broadcasting Decoder Applications, DVB, 16 February
1995 |
[17] |
Access Control : Common Scrambling system and Common Interface
for Conditional Access, Final Technical Report of the Conditional Access
Specialist Group, DAVIC second call for proposals, CCETT, 17 November 1994 |
[18] |
Standardisation in the DVB of conditional access systems
for pay TV, D van Schooneveld, Philips Research Laboratories, Einhoven, The
Netherlands, Tijdschrift van het Nederlands Elektronica- en Radiogenootschap
deel 60 - nr.3, 1995 |
[19] |
Set-Top-Boxen fur Digital-TV, Funkschau 23, 1995 |
[20] |
Why Crypto systems Fail, Ross Anderson, University Computer
Laboraty, Cambridge |
[21] |
The Black Disk, Information package for educational use
about hackers, scrambling, reverse engineering etc. |
[22] |
PICBUSTER - Details Released On Internet & The Vampire
Hack, John McCormac, WWW-pages of Hack Watch News, Piracy On The Final
Frontier 1995 |
[23] |
Brucke zwischen analoger und digitaler Welt, D-VHS, Rainer
Bucken, Fernseh- und kino- technik 49. Jahrgang Nr. 5/1995 |
[24] |
Macrovision FAQ v1.0c, Antti Paarlahti, 1995, WWW-pages:
http://www.paranoia.com/~filipg |
[25] |
Digital audio interface, International Standard IEC 958 |
[26] |
Copybit kraker, H.J. Schaake, Elektuur 1/94 |
[27] |
Copybit kraker II, H.J. Schaake, Elektuur 9/95 |
[28] |
Copybit-inverter, digitaal kopieren zonder belemmeringen,
W.Foede, Elektuur 1/96 |
[29] |
Overview of CD-ROM Encryption, Copy Protection, and Metering,
by Disc Manufacturing, Inc. (DMI) WWW-pages: http://www.4cdr.com/info/misc_info/encryption_methods.htm |
[30] |
Copy protection for software, M.Buchheit, Elektronik Vol:
41, Iss: 14, pag. 68-74, July 1992 |
[31] |
Software copy protection systems: structure, analysis,
attacks, A.V. Spesivtsev, A.J. Krutjakov et al., IEEE Proceedings. The
Institute of Electrical and Electronics Engineers 1992 International Carnahan
Conference on Security Technology: Crime Countermeasures |
[32] |
A proposed Federal Information Processing Standard for
an Escrowed Encryption Standard (EES), National Institute of Standards
and Technology (NIST), Federal Register, 58(145), July 1993 |
[33] |
Techniques for data hiding, Walter Bender, Daniel Gruhl,
and Norishige Morimoto, Massachusetts Institute of Technology, Media Laboratory
Cambridge, Proceedings of the SPIE, 2420:40, San Jose CA, Februari 1995 |
[34] |
Hiding Information in Document Images, J.Brassil, S.Low,
N.F.Maxemchuk, L.O'Gorman, AT&T Bell Laboratories |