[19] Auguste Kerckhoffs. La cryptographie militaire. J. des Sciences Militaires, 9:161191, 1883.
[20] Darko Kirovski and Fabien A.P. Petitcolas. Replacement attack on arbitrary watermarking systems. In Proc.
ACM Workshop on Digital Rights Management, 2002.
[21] Yana Liu. Backdoor.Ryknos.B technical description, November 2005. http://securityresponse.symantec.com/
avcenter/venc/data/backdoor.ryknos.b.html.
[22] MediaMax Technology Corp. Annual report (S.E.C. Form 10-KSB/A), September 2005.
[23] Microsoft Corporation. Windows Media data session toolkit. http://download.microsoft/com/download/a/1/a/
a1a66a2c-f5f1-450a-979b-ddf790756f1d/Data Session Datasheet.pdf.
[24] Nero AG. Nero Burning ROM. http://ww2.nero.com/enu/Products.html.
[25] Matti Nikki.
Muzzy's research about Sony's XCP DRM system, December 2005.
http://hack.fi/
muzzy/
sony-drm/.
[26] Fabien A.P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In
Information Hiding, pages 218238, 1998.
[27] K. Reichert and G. Troitsch. Kopierschutz mit filzstift knacken. Chip.de, May 2002.
[28] Mark Russinovich. More on Sony: Dangerous decloaking patch, EULAs and phoning home, November 2005.
http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.htm.
[29] Mark Russinovich. Sony, rootkits and digital rights management gone too far, October 2005. http://www.
sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html.
[30] Mark Russinovich. Sony's rootkit: First 4 Internet responds, November 2005. http://www.sysinternals.com/blog/
2005/11/sonys-rootkit-first-4-internet.html.
[31] Sony-BMG Music Entertainment.
Portable device: iPod information.
http://cp.sonybmg.com/xcp/english/
form10.html.
[32] Sony-BMG Music Entertainment. XCP frequently asked questions. http://cp.sonybmg.com/xcp/english/faq.
html.
[33] AndrŽe Wiethoff. Exact Audio Copy. http://www.exactaudiocopy.de/.
[34] Wikipedia. Fairplay. http://en.wikipedia.org/wiki/FairPlay.
27