{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:42:24Z","timestamp":1773567744799,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540427339","type":"print"},{"value":"9783540454960","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_7","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"81-95","source":"Crossref","is-referenced-by-count":47,"title":["Intellectual Property Metering"],"prefix":"10.1007","author":[{"given":"Farinaz","family":"Koushanfar","sequence":"first","affiliation":[]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Miodrag","family":"Potkonjak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"7_CR1","unstructured":"R. Anderson, M. Kuhn, \u201cTamper resistance-a cautionary note.\u201d USENIX Workshop on Electronic Commerce, pp. 1\u201311, 1996."},{"key":"7_CR2","unstructured":"T Aura, D. Gollmann, \u201cSoftware license management with smart cards.\u201d Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard\u201999), pp. 75\u201385, May1999."},{"key":"7_CR3","unstructured":"B.S. Baker, U. Manber, \u201cDeducing similarities in Java sources from bytecodes.\u201d USENIX Technical Conference, pp. 179\u201390, 1998."},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/568271.223855","volume":"24","author":"S. Brin","year":"1995","unstructured":"S. Brin, J. Davis, H. Garcia-Molina, \u201cCopy detection mechanisms for digital documents.\u201d SIG-MOD Record, vol. 24, no. 2, pp. 398\u2013409, 1995.","journal-title":"SIG-MOD Record"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"A.E. Caldwell, H. Choi, A.B. Kahng, S. Mantik, M. Potkonjak, G. Qu, J.L. Wong, \u201cEffective iterative techniques for fingerprinting design IP.\u201d Design Automation Conference, pp. 843\u2013848, 1999.","DOI":"10.1145\/309847.310083"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"G.J. Chaitin, \u201cRegister allocation and spilling via graph coloring.\u201d SIGPLAN\u2019 82 Symposium on Compiler Construction, pp. 98\u2013105, 1982.","DOI":"10.1145\/800230.806984"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"E. Charbon, I. Torunoglu, \u201cCopyright protection of designs based on multi source IPs.\u201d IEEE\/ ACM International Conference on Computer Aided Design, pp. 591\u2013595, June 1998.","DOI":"10.1109\/ICCAD.1999.810716"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"C.S. Collberg, \u201cReverse interpretation + mutation analysis = automatic retargeting.\u201d Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation, pp. 15\u201318, June 1997","DOI":"10.1145\/258915.258922"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/PROC.1975.9793","volume":"63","author":"R.E. Crochiere","year":"1975","unstructured":"R.E. Crochiere, A.V. Oppenheim, \u201cAnalysis of linear digital networks.\u201d Proceedings of the IEEE, vol. 63, no. 4, pp. 581\u201395., April 1975","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/43.681265","volume":"17","author":"S. Dey","year":"1998","unstructured":"S. Dey, V. Gangaram, M. Potkonjak, \u201cA controller redesign technique to enhance testability of controller-data path circuits.\u201d IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 17, no. 2, pp. 157\u201368, February 1998.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"6","key":"7_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman, \u201cNew directions in cryptography.\u201d IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644\u201354, November 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR12","unstructured":"http:\/\/www.dimacs.rutgers.edu"},{"key":"7_CR13","unstructured":"R. Findley Jr., Raymond, R. Dixon, \u201cDual smart card access control electronic data storage and retrieval system and methods.\u201d US patent#5629508, May 13, 1997."},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/0166-218X(92)90177-C","volume":"39","author":"P. Flajolet","year":"1992","unstructured":"P. Flajolet, D. Gardy, L. Thimonier, \u201cBirthday paradox, coupon collectors, caching algorithms and self-organizing search.\u201d Discrete Applied Mathematics, vol. 39, no. 3, pp. 207\u2013229, November 1992.","journal-title":"Discrete Applied Mathematics"},{"key":"7_CR15","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3233\/JCS-1998-6402","volume":"6","author":"M.K. Franklin","year":"1998","unstructured":"M.K. Franklin, D. Malkhi, \u201cAuditable metering with lightweight security\u201d. Journal of Computer Security, vol. 6, no. 4, IOS Press, pp. 237\u201355, 1998.","journal-title":"Journal of Computer Security"},{"key":"7_CR16","volume-title":"Computers and intractability. A guide to the theory of NP-com-pleteness","author":"M.R. Garey","year":"1979","unstructured":"M.R. Garey, D.S. Johnson, \u201cComputers and intractability. A guide to the theory of NP-com-pleteness.\u201d Oxford, UK: Freeman, 1979."},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/92.661258","volume":"6","author":"L.M. Guerra","year":"1998","unstructured":"L.M. Guerra, M. Potkonjak, J.M. Rabaey, \u201cBehavioral-level synthesis of heterogeneous BISR reconfigurable ASIC\u2019s.\u201d IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 6, no. 1, pp. 158\u201367, March 1998.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"issue":"7","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"F. Hartung, M. Kutter, \u201cMultimedia watermarking techniques.\u201d Proceedings of the IEEE, vol. 87, no. 7, pp. 1079\u2013107, July 1999.","journal-title":"Proceedings of the IEEE"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker, H. Wang, G. Wolfe, \u201cWatermarking techniques for intellectual property protection.\u201d 35th ACM\/IEEE Design Automation Conference Proceedings, pp. 776\u2013781, June 1998.","DOI":"10.1145\/277044.277240"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"A.B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, J.L. Wong, \u201cCopy detection for intellectual property protection of VLSI design.\u201d IEEE\/ACM International Conference on Computer Aided Design, pp. 600\u2013604, November 1999.","DOI":"10.1109\/ICCAD.1999.810718"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"D. Kirovski, M. Potkonjak, \u201cEfficient coloring of a large spectrum of graphs.\u201d Proceedings 1998 Design and Automation Conference, pp. 427\u201332, 1998.","DOI":"10.1145\/277044.277165"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"D. Kirovski, D. Liu, J.L. Wong, M. Potkonjak, \u201cForensic engineering techniques for VLSICAD tools.\u201d 37th ACM\/IEEE Design Automation Conference Proceedings, pp. 581\u20136, June 2000.","DOI":"10.1145\/337292.337584"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"K. Lofstrom, W.R. Daasch, D. Taylor, \u201cIC identification circuits using device mismatch.\u201d Proceedings of the International Solid-State Circuits Conference, pp. 372\u20133, 2000.","DOI":"10.1109\/ISSCC.2000.839821"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"D. P. Maher, \u201cFault induction attacks, tamper resistance, and hostile reverse engineering in perspective.\u201d Financial Cryptography First International Conference, pp. 109\u201321, 1997.","DOI":"10.1007\/3-540-63594-7_71"},{"key":"7_CR25","volume-title":"Handbook of applied cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P.C. van Oorschot, S.A. Vanstone, \u201cHandbook of applied cryptography.\u201d Boca Raton, FL: CRC Press, 1997."},{"issue":"1\u20137","key":"7_CR26","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/S0169-7552(98)00116-0","volume":"30","author":"M. Naor","year":"1998","unstructured":"M. Naor, B. Pinkas, \u201cSecure accounting and auditing on the Web.\u201d Computer Networks and ISDN Systems, vol. 30, no. 1\u20137, Elsevier, pp. 541\u201350, April 1998.","journal-title":"Computer Networks and ISDN Systems"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"R.L. Rivest (Edited by: Hirschfeld, R.), \u201cElectronic lottery tickets as micropayments.\u201d Financial Cryptography First International Conference, pp. 307\u201314, 1997.","DOI":"10.1007\/3-540-63594-7_87"},{"key":"7_CR28","unstructured":"C.D. Ross, N.W. Taylor, K.W. Kingdon, H.R. Davis, D. Major \u201cMethod and apparatus for electronic licensing.\u201d US patent# 5553143, Sept. 3, 1996"},{"key":"7_CR29","unstructured":"D.C. Thomas, \u201cMethod and apparatus for providing security for computer software.\u201d US patent#4446519, May 1984."},{"issue":"8\u201313","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1016\/S0169-7552(97)00021-4","volume":"29","author":"J. Pitkow","year":"1997","unstructured":"J. Pitkow, \u201cIn search of reliable usage data on the WWW.\u201d Computer Networks and ISDN Systems, vol. 29, no. 8\u201313, pp. 1343\u201355, September 1997.","journal-title":"Computer Networks and ISDN Systems"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"M. Potkonjak, S. Dey, K. Wakabayashi, \u201cDesign-for-Debugging of application specific designs.\u201d International Conference on Computer-Aided Design, pp. 295\u2013301, 1995.","DOI":"10.1109\/ICCAD.1995.480026"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"G. Qu, M. Potkonjak, \u201cAnalysis of watermarking techniques for graph coloring problem,\u201d IEEE\/ACM International Conference on Computer Aided Design, pp. 190\u2013193, November 1998.","DOI":"10.1145\/288548.288607"},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/54.82037","volume":"8","author":"J.M. Rabaey","year":"1991","unstructured":"J.M. Rabaey, C. Chu, P. Hoang, M. Potkonjak, \u201cFast prototyping of datapath-intensive architectures.\u201d IEEE Design & Test of Computers, June 1991, vol. 8, no. 2, pp. 40\u201351, June 1991.","journal-title":"IEEE Design & Test of Computers"},{"key":"7_CR34","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, \u201cApplied cryptography: protocols, algorithms, and source code in C,\u201d 2nd edition New York: Wiley, 1996.","edition":"2nd edition"},{"key":"7_CR35","volume-title":"Cryptography: theory and practice","author":"D.R. Stinson","year":"1995","unstructured":"D.R. Stinson, \u201cCryptography: theory and practice.\u201d Boca Raton, FL: CRC Press, 1995."},{"issue":"3","key":"7_CR36","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1002\/cta.4490200304","volume":"20","author":"L. Stok","year":"1992","unstructured":"L. Stok, J.A.G. Jess, \u201cForeground memory management in data path synthesis.\u201d International Journal of Circuit Theory and Applications, vol. 20, no. 3, pp. 235\u201355. May\u2013June 1992","journal-title":"International Journal of Circuit Theory and Applications"},{"key":"7_CR37","unstructured":"K. Veenstra, Altera Corporation, Personal Communication. January 1999."},{"key":"7_CR38","unstructured":"http:\/\/www.vsia.com"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:49Z","timestamp":1736993689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}