{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:50Z","timestamp":1725483710484},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_28","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"384-394","source":"Crossref","is-referenced-by-count":4,"title":["How to Break a Semi-anonymous Fingerprinting Scheme"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"28_CR1","unstructured":"Ross Anderson, Markus Kuhn: Tamper Resistance-a Cautionary Note; 2nd USENIX Workshop on Electronic Commerce, 1996, 1\u201312."},{"key":"28_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/3-540-13331-3","volume-title":"Eurocrypt\u201985","author":"R. Berger","year":"1984","unstructured":"R. Berger, R. Peralta, T. Tedrick: A Provably Secure Oblivious Transfer Protocol; Eurocrypt\u201985, LNCS 209, Springer-Verlag, Berlin 1984, 379\u2013386."},{"key":"28_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/BFb0023476","volume-title":"STACS 97","author":"I. Biehl","year":"1997","unstructured":"Ingrid Biehl, Bernd Meyer: Protocols for Collusion-Secure Asymmetric Fingerprinting; STACS 97, LNCS 1200, Springer-Verlag, Berlin 1997, 399\u2013412."},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Crypto\u201985","author":"G. R. Blakley","year":"1986","unstructured":"G. R. Blakley, Catherine Meadows, George B. Purdy: Fingerprinting Long Forgiving Messages; Crypto\u201985, LNCS 218, Springer-Verlag, Berlin 1986, 180\u2013189."},{"key":"28_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Crypto\u201993","author":"S. Brands","year":"1994","unstructured":"Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto\u201993, LNCS 773, Springer-Verlag, Berlin 1994, 302\u2013318."},{"key":"28_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u201995","author":"D. Boneh","year":"1995","unstructured":"Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto\u201995, LNCS 963, Springer-Verlag, Berlin 1995, 452\u2013465."},{"key":"28_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/3-540-44448-3_32","volume-title":"Asiacrypt\u201900","author":"J. Camenisch","year":"2000","unstructured":"Jan Camenisch: Efficient Anonymous Fingerprinting with Group Signatures; Asiacrypt\u201900, LNCS 1976, Springer-Verlag, Berlin 2000, 415\u2013428."},{"key":"28_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Eurocrypt\u201987","author":"D. Chaum","year":"1988","unstructured":"David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf: An Improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations; Eurocrypt\u201987, LNCS 304, Springer-Verlag, Berlin 1988, 127\u2013141."},{"key":"28_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Crypto\u201994","author":"B. Chor","year":"1994","unstructured":"Benny Chor, Amos Fiat, Moni Naor: Tracing Traitors; Crypto\u201994, LNCS 839, Springer-Verlag, Berlin 1994, 257\u2013270."},{"key":"28_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-44750-4_9","volume-title":"Crypto\u2019 95","author":"C. Crupeau","year":"1995","unstructured":"Claude Cr\u2019upeau, Jeroen van de Graaf, Alain Tapp: Committed Oblivious Transfer and Private Multi-Party Computation; Crypto\u2019 95, LNCS 963, Springer-Verlag, Berlin 1995, 110\u2013123."},{"key":"28_CR11","unstructured":"Josep Domingo-Ferrer, Jordi Herrera-Joancomarti: Efficient Smart-Card Based Anonymous Fingerprinting; CARDIS 98."},{"key":"28_CR12","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1049\/el:19980961","volume":"34\/13","author":"J. Domingo-Ferrer","year":"1998","unstructured":"Josep Domingo-Ferrer: Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redistributors; Electronics Letter 34\/13 (1998) 1303\u20131304.","journal-title":"Electronics Letter"},{"key":"28_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-49162-7_4","volume-title":"Public-Key Cryptography (PKC\u201999)","author":"J. Domingo-Ferrer","year":"1999","unstructured":"Josep Domingo-Ferrer: Anonymous Fingerprinting Based on Committed Oblivious Transfer; Second International Workshop on Practice and Theory in Public-Key Cryptography (PKC\u201999), Kamakura, Japan, LNCS 1560, Springer-Verlag, Berlin, 1999, 43\u201352."},{"key":"28_CR14","unstructured":"Josep Domingo-Ferrer: Personal communication."},{"key":"28_CR15","unstructured":"Paul Kocher, Joshua Jaffe, Ben Jun: Introduction to Differential Power Analysis; News, June 9th, 1998, see http:\/\/www.cryptography.com\/dpa"},{"key":"28_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt\u201996, LNCS 1070, Springer-Verlag, Berlin 1996, 84\u201395."},{"key":"28_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Eurocrypt\u201999","author":"B. Pfitzmann","year":"1999","unstructured":"Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting; Eurocrypt\u201999, LNCS 434, Springer-Verlag, Berlin 1999, 150\u2013164."},{"key":"28_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-44448-3_31","volume-title":"Asiacrypt\u201900","author":"B. Pfitzmann","year":"2000","unstructured":"Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-Repudiation; Asiacrypt\u201900, LNCS 1976, Springer-Verlag, Berlin 2000, 401\u2013414."},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; 4th ACM Conference on Computer and Communications Security, Z\u00fcrich, April 1997, 151\u2013160.","DOI":"10.1145\/266420.266453"},{"key":"28_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Eurocrypt\u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting; Eurocrypt\u201997, LNCS1233, Springer-Verlag, Berlin 1997, 88\u2013102."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:26Z","timestamp":1556376026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}