{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:05:48Z","timestamp":1778061948016,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_4","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"63-79","source":"Crossref","is-referenced-by-count":36,"title":["Self Protecting Pirates and Black-Box Traitor Tracing"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_22"},{"key":"4_CR2","unstructured":"Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of [BF99], 2001."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors, CRYPTO 1994.","DOI":"10.1007\/3-540-48658-5_25"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Benny Chor, Amos Fiat, and Moni Naor, and Benny Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, Vol. 46, no. 3, pp. 893\u2013910, 2000. (journal version of [CFN94,NP98]).","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork, Jeff Lotspiech and Moni Naor, Digital Signets: Self-Enforcing Protection of Digital Content, STOC 1996.","DOI":"10.1145\/237814.237997"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Amos Fiat and T. Tassa, Dynamic Traitor Tracing, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_23"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Eli Gafni, Jessica Staddon and Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_24"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Kaoru Kurosawa and Yvo Desmedt, Optimum Traitor Tracing and Asymmetric Schemes, Eurocrypt 1998.","DOI":"10.1007\/BFb0054123"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Moni Naor and Benny Pinkas, Threshold Traitor Tracing, CRYPTO 1998.","DOI":"10.1007\/BFb0055750"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Moni Naor and Benny Pinkas, Efficient Trace and Revoke Schemes, In the Proceedings of Financial Crypto\u2019 2000, Anguilla, February 2000.","DOI":"10.1007\/3-540-45472-1_1"},{"key":"4_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding Workshop","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Spring LNCS 1174, pp. 49\u201363, 1996."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann and Matthias Schunter, Asymmetric Fingerprinting, Eurocrypt 1996.","DOI":"10.1007\/3-540-68339-9_8"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann and M. Waidner, Asymmetric fingerprinting for larger collusions, in proc. ACM Conference on Computer and Communication Security, pp. 151\u2013160, 1997.","DOI":"10.1145\/266420.266453"},{"key":"4_CR14","series-title":"Lect Notes Comput Sci","first-page":"144","volume-title":"Proceedings of SAC\u201998","author":"D. Stinson","year":"1998","unstructured":"Douglas Stinson and Ruizhong Wei, Key preassigned traceability schemes for broadcast encryption, In the Proceedings of SAC\u201998, Lecture Notes in Computer Science 1556, Springer Verlag, pp. 144\u2013156, 1998."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Douglas R. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM J. on Discrete Math, Vol. 11, no. 1, 1998.","DOI":"10.1137\/S0895480196304246"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T02:02:35Z","timestamp":1588039355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}