{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:30:52Z","timestamp":1725485452032},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540429111"},{"type":"electronic","value":"9783540456247"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45624-4_27","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T23:23:35Z","timestamp":1180826615000},"page":"260-267","source":"Crossref","is-referenced-by-count":1,"title":["Partially Identifying Codes for Copyright Protection"],"prefix":"10.1007","author":[{"given":"Sylvia","family":"Encheva","sequence":"first","affiliation":[]},{"given":"G\u00e9rard","family":"Cohen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,31]]},"reference":[{"key":"27_CR1","unstructured":"Th. Beth, D. Jungnickel and H. Lenz, Design Theory, Wissenschaftsverlag, Berlin, (1985)."},{"key":"27_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Collusion-secure fingerprinting for digital data","author":"D. Boneh","year":"1995","unstructured":"D. Boneh and J. Shaw, \u201cCollusion-secure fingerprinting for digital data\u201d, Springer-Verlag LNCS963 (1995), pp. 452\u2013465 (Advances in Cryptology-Crypto\u2019 95)."},{"key":"27_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Tracing traitors","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat and M. Naor, \u201cTracing traitors\u201d, Springer-Verlag LNCS839 (1994), pp. 257\u2013270(Advances in Cryptology-Crypto\u2019 94)."},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/T-C.1969.222707","volume":"18","author":"A. D. Friedman","year":"1969","unstructured":"A. D. Friedman, R. L. Graham and J. D. Ullman, \u201cUniversal single transition time asynchronous state assignments\u201d, IEEE Trans. Comput. vol.18 (1969) pp.541\u2013547.","journal-title":"IEEE Trans. Comput"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1137\/0401035","volume":"1","author":"J. K\u00f6rner","year":"1988","unstructured":"J. K\u00f6rner and G. Simonyi, \u201cSeparating partition systems and locally different sequences\u201d, SIAM J. Discrete Math., vol. 1, pp. 355\u2013359, 1988.","journal-title":"SIAM J. Discrete Math"},{"key":"27_CR6","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, (1977)."},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/TC.1978.1675192","volume":"27","author":"T. Nanya","year":"1978","unstructured":"T. Nanya and Y. Tohma, \u201cOn Universal Single Transition Time Asynchronous State Assignments\u201d, IEEE Trans. Comput. vol. 27 (1978) pp. 781\u2013782.","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"27_CR8","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/18.135636","volume":"38","author":"Q.A. Nguyen","year":"1992","unstructured":"Q.A. Nguyen, L. Gy\u00f6r. and J. Massey, \u201cConstructions of Binary Constant-Weight Cyclic Codes and Cyclically Permutable Codes\u201d, IEEE Trans. on Inf. Theory, vol. 38, no. 3, (1992), pp. 940\u2013949.","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"27_CR9","unstructured":"V.S. Pless, W.C. Huffman-Editors, Handbook of Coding Theory, Elsevier, Amsterdam (1998)."},{"issue":"2","key":"27_CR10","first-page":"105","volume":"30","author":"Yu.L. Sagalovitch","year":"1994","unstructured":"Yu.L. Sagalovitch, \u201cSeparating systems\u201d, Problems of Information Transmission, Vol. 30 (2) (1994), pp. 105\u2013123.","journal-title":"Problems of Information Transmission"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0378-3758(99)00131-7","volume":"86","author":"D.R. Stinson","year":"2000","unstructured":"D.R. Stinson, Tran Van Trung and R. Wei, \u201cSecure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures\u201d, J. Stat. Planning and Inference, vol. 86 (2)(2000), pp. 595\u2013617.","journal-title":"J. Stat. Planning and Inference"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/(SICI)1520-6610(2000)8:3<189::AID-JCD4>3.0.CO;2-A","volume":"8","author":"D.R. Stinson","year":"2000","unstructured":"D.R. Stinson, R. Wei and L. Zhu, \u201cNew Constructions for Perfect Hash Families and Related Structures Using Combinatorial Designs and Codes\u201d, J. of Combinatorial Designs, vol. 8 (2000), pp. 189\u2013200.","journal-title":"J. of Combinatorial Designs"}],"container-title":["Lecture Notes in Computer Science","Applied Algebra, Algebraic Algorithms and Error-Correcting Codes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45624-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T02:12:48Z","timestamp":1548295968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45624-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540429111","9783540456247"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45624-4_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}