{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:38:49Z","timestamp":1753886329609},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540619963"},{"type":"electronic","value":"9783540495895"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61996-8_31","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T17:30:19Z","timestamp":1330277419000},"page":"49-64","source":"Crossref","is-referenced-by-count":82,"title":["Trials of traced traitors"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"5_CR1","first-page":"471","volume-title":"LNCS 740","author":"C. Blundo","year":"1993","unstructured":"Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences; Crypto '92, LNCS 740, Springer-Verlag, Berlin 1993, 471\u2013486."},{"key":"5_CR2","first-page":"535","volume-title":"LNCS 547","author":"S. Berkovits","year":"1991","unstructured":"Shimshon Berkovits: How To Broadcast A Secret; Eurocrypt '91, LNCS 547, Springer-Verlag, Berlin 1991, 535\u2013541."},{"key":"5_CR3","first-page":"287","volume-title":"LNCS 950","author":"C. Blundo","year":"1995","unstructured":"Carlo Blundo, Antonella Cresti: Space Requirements for Broadcast Encryption; Eurocrypt '94, LNCS 950, Springer-Verlag, Berlin 1995, 287\u2013298."},{"key":"5_CR4","first-page":"180","volume-title":"LNCS 218","author":"G. R. Blakley","year":"1986","unstructured":"G. R. Blakley, Catherine Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto '85, LNCS 218, Springer-Verlag, Berlin 1986, 180\u2013189."},{"key":"5_CR5","unstructured":"Rolf Blom: Key Distribution for Broadcast Cryptography; Third International Conference: Security Through Science and Engineering, September 23\u201326, 1980, Technical University Berlin, 19\u201323."},{"key":"5_CR6","first-page":"452","volume-title":"LNCS 963","author":"D. Boneh","year":"1995","unstructured":"Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto '95, LNCS 963, Springer-Verlag, Berlin 1995, 452\u2013465."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Gilles Brassard, David Chaum, Claude Cr\u00e9peau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156\u2013189.","journal-title":"Journal of Computer and System Sciences"},{"key":"5_CR8","first-page":"251","volume-title":"Proceedings VIS '95","author":"G. Caronni","year":"1995","unstructured":"Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS '95, Vieweg, Wiesbaden 1995, 251\u2013263."},{"key":"5_CR9","first-page":"87","volume-title":"LNCS 293","author":"D. Chaum","year":"1988","unstructured":"David Chaum, Ivan B. Damgard, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party's input and correctness of the result; Crypto '87, LNCS 293, Springer-Verlag, Berlin 1988, 87\u2013119."},{"key":"5_CR10","first-page":"257","volume-title":"LNCS 839","author":"B. Chor","year":"1994","unstructured":"Benny Chor, Amos Fiat, Moni Naor: Tracing traitors; Crypto '94, LNCS 839, Springer-Verlag, Berlin 1994, 257\u2013270."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork, Jeffrey Lotspiech, Moni Naor: Digital Signets; Self-Enforcing Protection of Digital Information; to appear at 28th Symposium on Theory of Computing (STOC) 1996; preliminary version received April 1996.","DOI":"10.1145\/237814.237997"},{"key":"5_CR12","first-page":"480","volume-title":"LNCS 773","author":"A. Fiat","year":"1994","unstructured":"Amos Fiat, Moni Naor: Broadcast Encryption; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, 480\u2013491."},{"key":"5_CR13","first-page":"218","volume-title":"How to play any mental game \u2014 or \u2014 a completeness theorem for protocols with honest majority","author":"O. Goldreich","year":"1987","unstructured":"Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game \u2014 or \u2014 a completeness theorem for protocols with honest majority; 19th Symposium on Theory of Computing (STOC) 1987, ACM, New York 1987, 218\u2013229."},{"key":"5_CR14","first-page":"84","volume-title":"LNCS 1070","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin 1996, 84\u201395."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Neal R. Wagner: Fingerprinting; Proceedings 1983 IEEE Symposium on Security and Privacy, April 25\u201327 1983, Oakland, California, 18\u201322.","DOI":"10.1109\/SP.1983.10018"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Andrew C. Yao: Protocols for Secure Computations; 23rd Symposium on Foundations of Computer Science (FOCS) 1982, IEEE Computer Society, 1982, 160\u2013164.","DOI":"10.1109\/SFCS.1982.38"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Andrew C. Yao: How to Generate and Exchange Secrets; 27th Symposium on Foundations of Computer Science (FOCS) 1986, IEEE Computer Society, 1986, 162\u2013167.","DOI":"10.1109\/SFCS.1986.25"},{"key":"5_CR18","unstructured":"Jian Zhao, Eckhard Koch: Embedding Robust Labels Into Images For Copyright Protection; Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, R. Oldenbourg Verlag, M\u00fcnchen 1995 (also at http:\/\/www.igd.fhg.de\/www\/igda8\/pub\/EmbedLabel.ps)."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61996-8_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:20Z","timestamp":1605629480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61996-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540619963","9783540495895"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-61996-8_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}