{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T22:24:25Z","timestamp":1748384665216},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656449"},{"type":"electronic","value":"9783540491620"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49162-7_14","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T19:51:55Z","timestamp":1185911515000},"page":"188-196","source":"Crossref","is-referenced-by-count":28,"title":["How to Copyright a Function?"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]},{"given":"Julien P.","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/278476.278489","volume":"41-7","author":"J.-M. Acken","year":"1998","unstructured":"J.-M. Acken, How watermarking adds value to digital content, Communications of the ACM, vol. 41-7, pp. 75\u201377, 1998.","journal-title":"Communications of the ACM"},{"key":"14_CR2","unstructured":"P. Bas, J.-M. Chassery and F. Davoine, Self-similarity based image watermarking, Proceedings of eusipco\u201998, Ninth European signal processing conference, European association for signal processing, pp. 2277\u20132280."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"The huge costs of software piracy, Computer Fraud and Security Bulletin, 09\/1997, Elsevier Science, page 3.","DOI":"10.1016\/S1361-3723(97)90056-7"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, Advances in cryptology crypto\u201995, Springer-Verlag, Lectures notes in computer science 963, pp. 452\u2013465, 1995.","DOI":"10.1007\/3-540-44750-4_36"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"B. Chor, A. Fiat and M. Naor, Tracing traitors, Advances in cryptology crypto\u201994, Springer-Verlag, Lectures notes in computer science 839, pp. 257\u2013270, 1994.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"14_CR6","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G. Miller","year":"1976","unstructured":"G. Miller, Riemann\u2019s hypothesis and tests for primality, Journal of computer and system sciences, vol. 13, pp. 300\u2013317, 1976.","journal-title":"Journal of computer and system sciences"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"D. Naccache and J. Stern, A new public-key cryptosystem,Advances in cryptology eurocrypt\u201997, Springer-Verlag, Lectures notes in computer science 1233, pp. 27\u201336, 1997.","DOI":"10.1007\/3-540-69053-0_3"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"M. Naor and B. Pinkas, Theshold Traitor Tracing, Advances in cryptology crypto\u201998, Springer-Verlag, Lectures notes in computer science 1462, pp. 502\u2013517, 1998.","DOI":"10.1007\/BFb0055750"},{"key":"14_CR9","first-page":"38","volume-title":"The other side of deception","author":"V. Ostrovsky","year":"1995","unstructured":"V. Ostrovsky, The other side of deception, Harper-Collins Publishers, New-York, page 38, 1995."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Schunter, Asymmetric fingerprinting, Advances in cryptology eurocrypt\u201996, Springer-Verlag, Lectures notes in computer science 1070, pp. 84\u201395, 1996.","DOI":"10.1007\/3-540-68339-9_8"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, Anonymous fingerprinting, Advances in cryptology eurocrypt\u201997, Springer-Verlag, Lectures notes in computer science 1233, pp. 88\u2013102, 1997.","DOI":"10.1007\/3-540-69053-0_8"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21-2","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"J. Rompel, One way functions are necessary and sufficient for secure digital signatures, Proceedings of the 22-nd Annual ACM Symposium on the Theory of Computing, pp. 387\u2013394, 1990.","DOI":"10.1145\/100216.100269"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1093\/comjnl\/39.9.741","volume":"39-9","author":"K. Verco","year":"1996","unstructured":"K. Verco and M. Wise, Plagiarism \u00e0 la mode: a comparison of automated systems for detecting suspected plagiarism, The Computer Journal, vol. 39-9, pp. 741\u2013750, 1996.","journal-title":"The Computer Journal"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49162-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:22:34Z","timestamp":1556713354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49162-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540656449","9783540491620"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-49162-7_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}