{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:13:23Z","timestamp":1725484403085},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_13","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T13:12:26Z","timestamp":1179753146000},"page":"83-89","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Fingerprinting Using Public-Key Cryptography"],"prefix":"10.1007","author":[{"given":"Hiroshi","family":"Yoshiura","sequence":"first","affiliation":[]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Takaragi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"N. R. Wagner, Fingerprinting, Proceedings of the 1983 Symposium on Security and Privacy, IEEE Computer Society, April, 1983, pp. 18\u201322.","DOI":"10.1109\/SP.1983.10018"},{"key":"13_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u2019 96","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann and M. Schunter, Asymmetric Fingerprinting, Eurocrypt\u2019 96, LNCS 1070, Springer-Verlag, Berlin, 1996, pp. 84\u201395."},{"key":"13_CR3","unstructured":"N. Miura, H. Watanabe, and T. Kasami, A Strong Watermarking against Server\u2019s Corruption, Proceedings of the 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, January, 1997."},{"key":"13_CR4","unstructured":"K. Baba, K. Iwamura, Z. Yuliang, and H. Imai, An Interactive Protocol for Image Fingerprinting, Proceedings of the 1998 Symposium on Cryptography and Information Security, Hamanako, Japan, January, 1998."},{"key":"13_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Crypto\u2019 85","author":"G.R. Blakley","year":"1986","unstructured":"G.R. Blakley, C. Meadows, and G.B Purdy, Fingerprinting Long Forgiving Message, Crypto\u2019 85, LNCS 218, Springer-Verlag, Berlin, 1986, pp. 180\u2013189."},{"key":"13_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u2019 95","author":"D. Boneh","year":"1995","unstructured":"D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, Crypto\u2019 95, LNCS 963, Springer-Verlag, Berlin, 1995, pp. 452\u2013465."},{"key":"13_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Proceedings of the Fist International Workshop on Information Hiding","author":"I. J. Cox","year":"1996","unstructured":"I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, A Secure, Robust Watermark for Multimedia, Proceedings of the Fist International Workshop on Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 185\u2013206."},{"key":"13_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/BFb0028497","volume-title":"Proceedings of Information and Communications Security","author":"H. Watanabe","year":"1997","unstructured":"H. Watanabe and T. Kasami, A Secure Code for Recipient Watermarking against Conspiracy Attacks by All Users, Proceedings of Information and Communications Security, LNCS 1334, Springer-Verlag, Berlin, pp. 414\u2013423."},{"key":"13_CR9","unstructured":"J. Yoshida, K. Iwamura, and H. Imai, A Coding Method for Collusion-Secure Watermark and Less Decline, Proceedings of the 1998 Symposium on Cryptography and Information Security, Hamanako, Japan, January, 1998."},{"key":"13_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Proceedings of the Fist International Workshop on Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"D. Aucsmith, Tamper Resistant Software, Proceedings of the Fist International Workshop on Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 317\u2013333."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:46:20Z","timestamp":1578523580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_13"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}