{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:57:03Z","timestamp":1725487023341},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_14","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:21:45Z","timestamp":1183375305000},"page":"163-175","source":"Crossref","is-referenced-by-count":0,"title":["Reed Solomon Codes for Digital Fingerprinting"],"prefix":"10.1007","author":[{"given":"Ravi Sankar","family":"Veerubhotla","sequence":"first","affiliation":[]},{"given":"Ashutosh","family":"Saxena","sequence":"additional","affiliation":[]},{"given":"Ved Prakash","family":"Gulati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R. Anderson","year":"1998","unstructured":"R. Anderson, F. A. P. Petitcolas: On The Limits of Steganography IEEE Journal of Selected Areas in Communications, 16(4), 474\u2013481, 1998","journal-title":"On The Limits of Steganography IEEE Journal of Selected Areas in Communications"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"D. Boneh, M. Franklin: An Efficient Public Key Traitor Tracing Scheme, Proceedings of Crypto\u2019 99, Springer-Verlag, pp. 338\u2013353, 1999","DOI":"10.1007\/3-540-48405-1_22"},{"key":"14_CR3","first-page":"1897","volume":"IT-44","author":"B. J. Shaw","year":"1998","unstructured":"Boneh, J. Shaw: Collusion-Secure Fingerprinting for Digital Data, IEEE Trans. Inform. Theory, vol IT-44, pp. 1897\u20131905, 1998","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Chor, A. Fiat, M. Naor: Tracing Traitors, Proceedings of Crypto\u2019 94, Springer-Verlag, pp. 257\u2013270, 1994","DOI":"10.1007\/3-540-48658-5_25"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"H. D. L. Hollman, J. H. van Lint, J. P. Linnartz, L. M. G. M. Tolhui-zen: On Codes with the Identifiable Parent Property, Journal of Combinatorial Theory, pp. 121\u2013133, Series 82, 1998","DOI":"10.1006\/jcta.1997.2851"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"S. Katzenbeisser, F. A. P. Petitcolas (ed.): Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Kiayias, M. Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications ECCC Technical Report TR02-017, 2002","DOI":"10.1007\/3-540-45465-9_21"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kiayias, M. Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes, Proceedings of ICALP 2002, Springer-Verlag, pp 232\u2013243","DOI":"10.1007\/3-540-45465-9_21"},{"key":"14_CR9","unstructured":"L\u00f6fvenberg, T. Lindkvist: A General Description of Pirate Strategies in a Binary Fingerprinting System, 2000, http:\/\/www.it.isy.liu.se\/publikationer\/LiTH-ISY-R-2259.pdf"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"P. Sarkar, D. R. Stinson: Frameproof and IPP Codes, Indocrypt\u201901, Springer-Verlag, pp.117\u2013126, 2001","DOI":"10.1007\/3-540-45311-3_12"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1137\/S0895480196304246","volume":"11","author":"R. Stinson","year":"1998","unstructured":"R. Stinson, R. Wei: Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal of Discrete Mathematics 11, pp. 41\u201353, 1998","journal-title":"SIAM Journal of Discrete Mathematics"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T21:26:38Z","timestamp":1556573198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}