{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:56:31Z","timestamp":1725486991772},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540417828"},{"type":"electronic","value":"9783540452478"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45247-8_18","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:15:18Z","timestamp":1183374918000},"page":"221-234","source":"Crossref","is-referenced-by-count":4,"title":["Efficient anonymous fingerprinting of electronic information with improved automation with improved automatic identification of redistributors"],"prefix":"10.1007","author":[{"given":"Chanjoo","family":"Chung","sequence":"first","affiliation":[]},{"given":"Seungbok","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Youngchul","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,3,21]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Josep Domingo-Ferrer, \u201cAnonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributors\u201d, Electronics Letters 34\/13, 1998, pp.1303\u20131304.","DOI":"10.1049\/el:19980961"},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","first-page":"180","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 85","author":"G.R. Blankey","year":"1986","unstructured":"Blankey, G.R., C. Meadows, and G.B. Purdy, \u201cFingerprinting Long Forgiving Messages\u201d, in Advances in Cryptology, Proceedings of CRYPTO\u2019 85, vol. 218 of Lecture Notes in Computer Science, Springer-Verlag, 1986, pp.180\u2013189."},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 95","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., and J. Shaw, \u201cCollusion-secure Fingerprinting for Digital Data\u201d, in Advances in Cryptology, Proceedings of CRYPTO\u2019 95, vol.963 of Lecture Notes in Computer Science, Springer-Verlag, 1995, pp.452\u2013465."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/3-540-61996-8_40","volume-title":"Information Hiding: First International Workshop. Proceedings","author":"S. H. Low","year":"1996","unstructured":"Low, S. H., and N. F. Maxemchuk, \u201cModeling Cryptographic Protocols and their Collusion Analysis\u201d, in Information Hiding: First International Workshop. Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp.169\u2013184."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., and Waidner, M., Asymmetric Fingerprinting for Larger Collutions\u201d 4th ACM Conference on Computer and Communications Security, acm press, 1997, pp. 151\u2013160.","DOI":"10.1145\/266420.266453"},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/BFb0023476","volume-title":"STACS 97","author":"I. Biehl","year":"1997","unstructured":"Biehl, I. and Meyer, B., \u201cProtocol for Collusion-Secure Asymmetric Fingerprinting\u201d, STACS 97, vol. 1200 of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp.399\u2013412."},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Tracing Traitors","author":"B. Chor","year":"1994","unstructured":"Chor, B., A. Fiat, and M. Naor, \u201cTracing Traitors\u201d, in Advances in Cryptology, Proceedings of CRYPTO\u2019 94, vol.839 of Lecture Notes in Computer Science, Springer-Verlag, 1994, pp.257\u2013270."},{"key":"18_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/BFb0055750","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 98","author":"M. Naor","year":"1998","unstructured":"Naor, M., and Pinkas, B., \u201cThreshold Traitor Tracing\u201d, in Advances in Cryptology, Proceedings of CRYPTO\u2019 98, vol. 1462 of Lecture Notes in Computer Science, Springer-Verlag, 1998, pp.502\u2013517."},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 99","author":"D. Boneh","year":"1999","unstructured":"Boneh, D., and Franklin, M., \u201cAn Efficient Public Key Traitor Tracing Scheme\u201d, in Advances in Cryptology, Proceedings of CRYPTO\u2019 99, vol. 1666 of Lecture Notes in Computer Science, Springer-Verlag, 1999, pp338\u2013353."},{"key":"18_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-48405-1_23","volume-title":"Advances in Cryptology. Proceedings of CRYPTO\u2019 99","author":"A. Fiat","year":"1999","unstructured":"Fiat, A., and Tassa, T., \u201cDynamic Traitor Tracing\u201d, in Advances in Cryptology. Proceedings of CRYPTO\u2019 99, vol. 1666 of Lecture Notes in Computer Science, Springer-Verlag, 1999.pp354\u2013371"},{"key":"18_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 96","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., and M. Schunter, \u201cAsymmetric Fingerprinting\u201d, in Advances in Cryptology, Proceedings of EUROCRYPT\u2019 96, vol. 1070of Lecture Notes in Computer Science. Springer-Verlag, 1996, pp.84\u201395."},{"key":"18_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding: First International Workshop, Proceedings","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., \u201cTrials of Traced Traitors\u201d, in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp.49\u201364."},{"key":"18_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Anonymous Fingerprinting","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., and M. Waidner, \u201cAnonymous Fingerprinting\u201d, in Advances in Cryptology, Proceedings of EUROCRYPT\u2019 97, vol. 1233 of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp.88\u2013102."},{"key":"18_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 99","author":"B. Pfitzmann","year":"1999","unstructured":"Pfitzmann, B., and A. Sadeghi, \u201cCoin-Based Anonymous Fingerprinting\u201d in Advances in Cryptology, Proceedings of EUROCRYPT\u2019 99, vol. 1592 of Lecture Notes in Computer Science, Springer-Verlag, 1999, pp.150\u2013164."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T., \u201cA public-key cryptosystem and signature scheme based on discrete logarithms\u201d, IEEE trans. Inf. Theory, 1985, IT-31, pp.469\u2013472.","journal-title":"IEEE trans. Inf. Theory"},{"key":"18_CR16","series-title":"Lect Notes Comput Sci","first-page":"127","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 87","author":"D. Chaum","year":"1987","unstructured":"Chaum, D., Evertse, J.-H., and Van De Graaf, J., \u201cAn improved protocol for demonstrating possessions of discrete logarithms and some generalizations\u201d, in Advances in Cryptology, Proceedings of EUROCRYPT\u2019 87, vol. 304 of Lecture Notes in Computer Science, Springer-Verlag, 1987, pp.127\u2013141."},{"key":"18_CR17","series-title":"Lect Notes Comput Sci","first-page":"87","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 87","author":"D. Chaum","year":"1987","unstructured":"Chaum, D., Damgaard, I.B., and Van De Graaf, J., \u201cMultiparty computation ensuring privacy of each party\u2019s input and correctness of the result\u201d, in Advances in Cryptology, Proceedings of EUROCRYPT\u2019 87, vol. 293 of Lecture Notes in Computer Science, Springer-Verlag, 1987, pp.87\u2013119."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F. A. P, \u201cInformation Hiding Techniques for Steganography and Digital Watermarking\u201d, Artech House, 2000.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"issue":"7","key":"18_CR19","first-page":"1062","volume":"87","author":"F.A.P. Peticolas","year":"1999","unstructured":"Peticolas, F.A.P., R. J. Anderson, and M. G. Kuhn, \u201cInformation Hiding-A Survey\u201d, Proceedings of the IEEE, vol. 87, no. 7, 1999 pp.1062\u20131078.","journal-title":"Information Hiding-A Survey"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45247-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T21:25:56Z","timestamp":1556573156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45247-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540417828","9783540452478"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45247-8_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}