{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:05:38Z","timestamp":1770833138989,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_36","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"452-465","source":"Crossref","is-referenced-by-count":181,"title":["Collusion-Secure Fingerprinting for Digital Data"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"James","family":"Shaw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/18.119713","volume":"38","author":"N. Alon","year":"1992","unstructured":"N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs, IEEE Transactions on Information Theory, vol. 38, 1992, pp. 509\u2013516.","journal-title":"IEEE Transactions on Information Theory"},{"key":"36_CR2","unstructured":"N. Alon and J. Spencer, The probabilistic method, Wiley, 1992."},{"key":"36_CR3","unstructured":"J. Brassil, S. Low, N. Maxemchuk and L. O\u2019Gorman, Electronic marking and identification techniques to discourage document copying, Proceedings of Infocom\u2019 94, pp. 1278\u20131287, June 1994."},{"key":"36_CR4","volume-title":"Proceedings of \u2018reliable IT systems\u2019 (verlaessliche IT-Systeme) VIS\u2019 95","author":"G. Caronni","year":"1995","unstructured":"G. Caronni, Assuring ownership rights for digital images, H.H. Brueggemann and W. Gerhardt-Haeckl (Ed.) Proceedings of \u2018reliable IT systems\u2019 (verlaessliche IT-Systeme) VIS\u2019 95 Vieweg Publishing Company, Germany, 1995."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"B. Chor, A. Fiat and M. Naor, Tracing traitors, Proceedings of Crypto, 1994, pp. 257\u2013270.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erd\u00f6s","year":"1985","unstructured":"P. Erd\u00f6s, P. Frankl, Z. F\u00fcredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51, 1985, pp. 79\u201389.","journal-title":"Israel J. of math."},{"key":"36_CR7","unstructured":"D. Glover, The protection of computer software, Cambridge University, 2nd ed., 1992."},{"key":"36_CR8","unstructured":"O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, to appear in JASM."},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, The search for provably secure cryptosystems, AMS Lecture notes cryptology and computational number theory, 1990.","DOI":"10.1090\/psapm\/042\/1095553"},{"key":"36_CR10","unstructured":"M. Naor, Private communications."},{"key":"36_CR11","unstructured":"B. Schneier, Applied cryptography, Wiley, 1994."},{"key":"36_CR12","unstructured":"Software Publishers Association, Press release, 1994."},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"K. Tanaka, Y. Nakamura and K. Matsui. Embedding secret information into a dithered multi-level image, Proceedings of the 1990 IEEE Military Communications Conference, pp. 216\u2013220, September 1990.","DOI":"10.1109\/MILCOM.1990.117416"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"van Lint, Introduction to coding theory, Springer-Verlag, 1982.","DOI":"10.1007\/978-3-662-07998-0"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"N. Wagner, Fingerprinting, Proceedings of the 1983 IEEE Symposium on Security and Privacy, April, 1983, pp. 18\u201322.","DOI":"10.1109\/SP.1983.10018"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:18:14Z","timestamp":1556756294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}