{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:24Z","timestamp":1725551604559},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_14","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"191-204","source":"Crossref","is-referenced-by-count":0,"title":["Key Management for Multicast Fingerprinting"],"prefix":"10.1007","author":[{"given":"Jian","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lein","family":"Harn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Wu, T., Wu, S.: Selective encryption and watermarking of mpeg video, Tech. Rep., North Carolina State Univ"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Brown, I., Perkins, C., Crowcroft, J.: Watercasting: distributed watermarking of multicast media. In: Proc. of the First Intl workshop on Networked Group Communication (1999)","DOI":"10.1007\/978-3-540-46703-8_18"},{"issue":"6","key":"14_CR3","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/S1389-1286(02)00227-X","volume":"39","author":"P. Judge","year":"2002","unstructured":"Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a hierarchy of Intermediaries. Computer Networks\u00a039(6), 699\u2013712 (2002)","journal-title":"Computer Networks"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/568567.568570","volume":"32","author":"H. Chu","year":"2002","unstructured":"Chu, H., Qiao, L., Nahrstedt, K.: A secure multicast protocol with copyright protection. ACM SIGCOMM Comp. Comm. Review\u00a032(2), 42\u201360 (2002)","journal-title":"ACM SIGCOMM Comp. Comm. Review"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Parviainen, R., Parnes, P.: Large Scale Distributed Watermarking of Multicast Media Through Encryption. In: Intl. Fed. for Info. Proc., Comm. and Multimedia Sec. Joint working Conf. IFIP Tc6 and TC11, May 21-22 (2001)","DOI":"10.1007\/978-0-387-35413-2_14"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B.A. Chor","year":"1994","unstructured":"Chor, B.A., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Advances in Cryptology","author":"G.R. Blakley","year":"1986","unstructured":"Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 180\u2013189. Springer, Heidelberg (1986)"},{"issue":"5","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for digital data. IEEE Trans. on Info. Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. on Info. Theory"},{"issue":"20","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1697","DOI":"10.1049\/el:20001231","volume":"36","author":"J. Domingo-Ferrer","year":"2000","unstructured":"Domingo-Ferrer, J., Herrera-Joancomarti, J.: Short collusion-secure fingerprints based on dual binary hamming codes. Electronics Letters\u00a036(20), 1697\u20131699 (2000)","journal-title":"Electronics Letters"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/3-540-47870-1_5","volume-title":"Security and Privacy in Digital Rights Management","author":"R. Safavi-Naini","year":"2002","unstructured":"Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 57\u201375. Springer, Heidelberg (2002)"},{"issue":"3","key":"14_CR11","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/18.915661","volume":"47","author":"J.N. Staddon","year":"2001","unstructured":"Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE trans. on Info. Theory\u00a047(3), 1042\u20131049 (2001)","journal-title":"IEEE trans. on Info. Theory"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/10719724_10","volume-title":"Information Hiding","author":"H. Guth","year":"2000","unstructured":"Guth, H., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 134\u2013135. Springer, Heidelberg (2000)"},{"issue":"7","key":"14_CR13","doi-asserted-by":"publisher","first-page":"3029","DOI":"10.1109\/18.959283","volume":"47","author":"R. Safavi-Naini","year":"2001","unstructured":"Safavi-Naini, R., Wang, Y.: New results on frameproof codes and traceability schemes. IEEE Trans. on Info. Theory\u00a047(7), 3029\u20133033 (2001)","journal-title":"IEEE Trans. on Info. Theory"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/3-540-36231-2_13","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"V.D. To","year":"2002","unstructured":"To, V.D., Safavi-Naini, R., Wang, Y.: A 2-secure Code with Efficient Tracing Algorithm. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 149\u2013163. Springer, Heidelberg (2002)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-45861-1_14","volume-title":"Information Security and Cryptology - ICISC 2001","author":"G. Cohen","year":"2002","unstructured":"Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 178\u2013185. Springer, Heidelberg (2002)"},{"key":"14_CR16","unstructured":"Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures, IETF draft wallner-key (July 1997)"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE\/ACM Trans. on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Halevi","year":"2002","unstructured":"Halevi, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 47\u201360. Springer, Heidelberg (2002)"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/3-540-36178-2_27","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"T. Asano","year":"2002","unstructured":"Asano, T.: A Revocation Scheme with Minimal Storage at Receivers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 433\u2013450. Springer, Heidelberg (2002)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-45861-1_13","volume-title":"Information Security and Cryptology - ICISC 2001","author":"H. Kurnio","year":"2002","unstructured":"Kurnio, H., Safavi-Naini, R., Wang, H.: Efficient Revocation Schemes for Secure Multicast. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 160\u2013177. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:57Z","timestamp":1619506317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11593980_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}