{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:25:23Z","timestamp":1742379923725},"publisher-location":"New York","reference-count":24,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_18","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T22:15:45Z","timestamp":1128896145000},"page":"237-249","source":"Crossref","is-referenced-by-count":1,"title":["A System for End-to-End Authentication of Adaptive Multimedia Content"],"prefix":"10.1007","author":[{"given":"Takashi","family":"Suzuki","sequence":"first","affiliation":[]},{"given":"Zulfikar","family":"Ramzan","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Fujimoto","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Gentry","sequence":"additional","affiliation":[]},{"given":"Takehiro","family":"Nakayama","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"NTT DoCoMo i-mode. http:\/\/www.nttdocomo.com\/corebiz\/imode."},{"key":"18_CR2","unstructured":"M. Etoh and S. Sekiguchi. MPEG-7 enabled digest video streaming over 3G mobile network. 12th International Packet Video Workshop (PV2002), Apr '02."},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, vol. 33, no. 4, 1986, pp 210\u2013217.","journal-title":"Journal of the ACM"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"C. Gentry, A. Hevia, R. Jain, T. Kawahara, and Z. Ramzan. End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. To Appear in J. Selected Areas of Communication, Ql, 2005.","DOI":"10.1109\/JSAC.2004.839391"},{"key":"18_CR5","unstructured":"Microsoft Windows Media 9 Series, http:\/\/www.microsoft.com\/windows."},{"key":"18_CR6","unstructured":"Real Networks. RealOne player, http:\/\/www.realnetworks.com."},{"key":"18_CR7","unstructured":"IETF RFC 3238. http:\/\/www.ietf.org\/rfc\/rfc3238.txt."},{"key":"18_CR8","unstructured":"IETF Open Pluggable Edge Services (OPES) Working Group. http:\/\/www.ietf.org\/html.charters\/opes-charter.html."},{"key":"18_CR9","unstructured":"IBM alphaWorks XML Security Suite, http:\/\/www.alphaworks.ibm.com\/tech\/."},{"key":"18_CR10","unstructured":"T. Yuuichi, T. Kaori, O. Takeshi, S. Shinji, and M. Hideo. ASIA: Information Sharing System with Derived Content Restriction Management. IEICE Transactions on Communications (Japanese Edition), vol. 428, pp 1463\u20131475, Aug '03."},{"key":"18_CR11","unstructured":"W3C Recommendation. Synchronized Multimedia Integration Language (SMIL 2.0). http:\/\/www.w3.org\/TR\/smil20. Aug '01."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume":"2271","author":"R. Johnson","year":"2002","unstructured":"R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. CT-RSA, Lecture Notes in Computer Science, vol. 2271, pp 244\u2013262, 2002.","journal-title":"CT-RSA, Lecture Notes in Computer Science"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"A. Shamir and Y. Tauman. Improved Online\/Offline Signature Schemes. Proc. of Crypto 2001, pp 355\u2013367.","DOI":"10.1007\/3-540-44647-8_21"},{"key":"18_CR14","unstructured":"W3C Recommendation. XML-Signature Syntax and Processing. http:\/\/www.w3.org\/TR\/xmldsig-core. Feb'02."},{"key":"18_CR15","unstructured":"National Institute of Standards and Technology, U.S. Department of Commerce. Secure Hash Standard. Federal Information Processing Standards Publication 180-1, Apr. 1995."},{"key":"18_CR16","unstructured":"OASIS Committee. eXtensible Access Control Markup Language vl.0. http:\/\/www.oasis-open.org. Feb'03."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"R. Merkle. Protocols for Public Key Cryptosystems. Proc. of the IEEE Symposium on Security and Privacy, pp 122\u2013134, 1980.","DOI":"10.1109\/SP.1980.10006"},{"key":"18_CR18","unstructured":"H. Krawczyk and T. Rabin. Chameleon Hashing and Signature. Proc. of NDSS '2000."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. Proc. of Eurocrypt '03. LNCS 2656, pp. 416\u2013432.","DOI":"10.1007\/3-540-39200-9_26"},{"issue":"2","key":"18_CR20","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing. 17(2), pp281\u2013308, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"18_CR21","unstructured":"[21] OMA. DRM2.0 Enabler Release, http:\/\/www.openmobilealliance.org. Feb '04."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"R. Steinfeld, L. Bull and Y. Zheng. Content Extraction Signatures. Proc. of ICISC 2001. LNCS, vol.2288, pp.285\u2013304.","DOI":"10.1007\/3-540-45861-1_22"},{"key":"18_CR23","unstructured":"W3C Recommendation. SOAP v 1.2. http:\/\/www.w3.org\/TR\/SOAP. June '03."},{"key":"18_CR24","unstructured":"W3C Recommendation. XSL Transformations vl.0. http:\/\/www.w3.org\/TR\/xslt. Nov '99."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:58:36Z","timestamp":1605643116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_18","relation":{},"subject":[]}}