{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:01Z","timestamp":1725483721233},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_22","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"303-315","source":"Crossref","is-referenced-by-count":8,"title":["A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience"],"prefix":"10.1007","author":[{"given":"Hirofumi","family":"Muratani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Wagner, N. R., \u201cFingerprinting,\u201d Proceedings of the 1983 Symposium on Security and Privacy, Oakland, California, U. S. A., 25\u201327 Apr. 1983, Technical Committee on Security & Privacy, IEEE Computer Society, 18\u201322, 1983.","DOI":"10.1109\/SP.1983.10018"},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Proceedings of Advanced Cryptology-CRYPTO\u201885","author":"G. R. Blakley","year":"1986","unstructured":"Blakley, G. R., C. Meadows and G. Purdy, \u201cFingerprinting Long Forgiving Messages,\u201d Proceedings of Advanced Cryptology-CRYPTO\u201885, Lecture Notes in Computer Science, Vol. 218, Springer-Verlag, 180\u2013189, 1986."},{"key":"22_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Proceedings of Advances in Cryptology-CRYPTO\u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D. and J. Shaw, \u201cCollusion-Secure Fingerprinting for Digital Data,\u201d Proceedings of Advances in Cryptology-CRYPTO\u201995, Santa Barbara, California, U. S. A., 27\u201331 Aug. 1995, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, 452\u2013465, 1995."},{"key":"22_CR4","unstructured":"Suzuoki, M., H. Watanabe and T. Kasami, \u201cA Scheme of Making Collusion-Secure Watermark,\u201d Proceedings of the 1997 Symposium on Cryptography and Information Security, SCIS\u201997, Fukuoka, Japan, 29 Jan.\u20131 Feb. 1997, 31B, 1997 (in Japanese)."},{"key":"22_CR5","unstructured":"Yoshida, J., K. Iwamura and H. Imai, \u201cA Coding Method for Collusion-Secure Watermark and Less Decline,\u201d Proceedings of the 1998 Symposium of Cryptography and Information Security, SCIS\u201898, Shizuoka, Japan, 28\u201331 Jan. 1998, 10.2.A, 1998 (in Japanese)."},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Proceedings of Advanced Cryptology-CRYPTO\u201d94","author":"B. Chor","year":"1994","unstructured":"Chor, B., A. Fiat and M. Naor, \u201cTracing traitors,\u201d Proceedings of Advanced Cryptology-CRYPTO\u201d94, Santa Barbara, California, U. S. A., 22-25 Aug. 1994, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, 257\u2013270, 1994."},{"key":"22_CR7","volume-title":"The Probabilistic Method","author":"N. Alon","year":"1992","unstructured":"Alon, N., J. H. Spencer and P. Erd\u00f6s, \u201cThe Probabilistic Method,\u201d John Wiley & Sons, Inc., New York, 1992."},{"key":"22_CR8","unstructured":"Lindkvist, T., \u201cFingerprinting digital document,\u201d Ph.D. thesis, LIU-TEK-LIC-1999:56, Link\u00f6ping University, 1999."},{"key":"22_CR9","unstructured":"Wiberg, N. and T. Lindkvist, \u201cOn the Performance of Certain Collusion-Secure Fingerprinting Codes,\u201d \n                  http:\/\/www.it.isy.liu.se\/research\n                  \n                ."},{"key":"22_CR10","unstructured":"L\u00f6fvenberg, J., \u201cRandom Codes for Digital Fingerprinting,\u201d LIU-TEK-LIC-1999:07, Link\u00f6ping University, 1999."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich, O., D. Ron and M. Sudan, \u201cChinese Remaindering with Errors,\u201d Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 225\u2013234, 1999.","DOI":"10.1145\/301250.301309"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., \u201cFinding Smooth Integers in Short Intervals Using CRT Decoding,\u201d Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 265\u2013272, 2000.","DOI":"10.1145\/335305.335337"},{"key":"22_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45539-6_4","volume-title":"Proceedings of the Advances in Cryptology-EURO-CRYPT 2000","author":"D. Bleichenbacher","year":"2000","unstructured":"Bleichenbacher, D. and P. Q. Nguyen, \u201cNoisy Polynomial Interpolation and Noisy Chinese Remaindering,\u201d Proceedings of the Advances in Cryptology-EURO-CRYPT 2000, Bart Preneel (ed.), Bruges, Belgium, 14\u201318 May 2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, 53\u201369, 2000."},{"key":"22_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/10719724_10","volume-title":"Proceedings of the Third International Worksho p, Information Hiding, IH\u201999","author":"H.-J. Guth","year":"2000","unstructured":"Guth, H.-J. and B. Pfitzmann, \u201cError-and Collusion-Secure Fingerprinting for Digital Data,\u201d Proceedings of the Third International Worksho p, Information Hiding, IH\u201999, Andreas Pfitzmann (ed.), Dresden, Germany, 29 Sept.\u20131 Oct. 1999, Lecture Notes in Computer Science, Vol. 1768, Springer-Verlag, 134\u2013145, 2000."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T15:47:18Z","timestamp":1547740038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}