{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:22:50Z","timestamp":1751923370261,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540436775"},{"type":"electronic","value":"9783540478706"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-47870-1_3","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:16:44Z","timestamp":1179746204000},"page":"22-39","source":"Crossref","is-referenced-by-count":35,"title":["On Crafty Pirates and Foxy Tracers"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,5,7]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","first-page":"1361","volume-title":"Security Protocols","author":"R. Anderson","year":"1997","unstructured":"Ross Anderson and Markus Kuhn, Low Cost Attacks on Tamper Resistant Devices, Security Protocols, Springer LNCS 1361, 1997."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan and Ke Yang, On the (Im)Possibility of Obfuscating Programs, CRYPTO 2001.","DOI":"10.1007\/3-540-44647-8_1"},{"key":"3_CR3","unstructured":"Omer Berkman, Michael Parnas, and Jiri Sgall Efficient Dynamic Traitor Tracing, 11th SODA, 2000."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_22"},{"key":"3_CR5","unstructured":"Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, manuscript, 2001."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dan Boneh and James Shaw, Collusion-Secure Fingerprinting for Digital Data, CRYPTO 1995.","DOI":"10.1007\/3-540-44750-4_36"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors, CRYPTO 1994.","DOI":"10.1007\/3-540-48658-5_25"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Benny Chor, Amos Fiat, Moni Naor, and Benny Pinkas, Tracing Traitors, IEEE Transactions on Information Theory, Vol. 46, no. 3, pp. 893\u2013910, 2000. (originally appeared as [7,15]).","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Amos Fiat and T. Tassa, Dynamic Traitor Tracing, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_23"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Eli Gafni, Jessica Staddon and Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption, CRYPTO 1999.","DOI":"10.1007\/3-540-48405-1_24"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias and Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing, to appear in the Proceedings of CRYPTO 2001.","DOI":"10.1007\/3-540-44647-8_4"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane Resistance of Digital Watermarks to Collusive Attacks, Proceedings of the 1998 IEEE International Symposium on Information Theory pp. 271, 1998.","DOI":"10.1109\/ISIT.1998.708876"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"K. Kurosawa and Y. Desmedt, Optimum Traitor Tracing and Asymmetric Schemes, Eurocrypt 1998.","DOI":"10.1007\/BFb0054123"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Dalit Naor, Moni Naor, and Jeffrey B. Lotspiech Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Moni Naor and Benny Pinkas, Threshold Traitor Tracing, CRYPTO 1998.","DOI":"10.1007\/BFb0055750"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Moni Naor and Benny Pinkas, Efficient Trace and Revoke Schemes, In the Proceedings of Financial Crypto\u2019 2000, Anguilla, February 2000.","DOI":"10.1007\/3-540-45472-1_1"},{"key":"3_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding Workshop","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Spring LNCS 1174, pp. 49\u201363, 1996."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann and Matthias Schunter, Asymmetric Fingerprinting, Eurocrypt 1996.","DOI":"10.1007\/3-540-68339-9_8"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Brigitt Pfitzmann and M. Waidner, Asymmetric fingerprinting for larger collusions, in proc. ACM Conference on Computer and Communication Security, pp. 151\u2013160, 1997.","DOI":"10.1145\/266420.266453"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Reihaneh Safavi-Naini and Yejing Wang, Sequential Traitor Tracing, CRYPTO 2000.","DOI":"10.1007\/3-540-44598-6_20"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Douglas R. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM J. on Discrete Math, Vol. 11, no. 1, 1998.","DOI":"10.1137\/S0895480196304246"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47870-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T14:30:31Z","timestamp":1737037831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47870-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540436775","9783540478706"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-47870-1_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}