{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:57:00Z","timestamp":1769846220769,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_8","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"88-102","source":"Crossref","is-referenced-by-count":77,"title":["Anonymous Fingerprinting"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"8_CR1","volume-title":"Theory and Practice of Error Control Codes","author":"R. E. Blahut","year":"1983","unstructured":"Richard E. Blahut: Theory and Practice of Error Control Codes; Addison-Wesley, Reading 1983."},{"key":"8_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Crypto\u2019 93","author":"S. Brands","year":"1994","unstructured":"Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto\u2019 93, LNCS 773, Springer-Verlag, Berlin 1994, 302\u2013318."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Gilles Brassard, David Chaum, Claude Cr\u00e9peau: Minimum Disclosure Proofs of Knowledge; Journal of Computer and System Sciences 37 (1988) 156\u2013189.","journal-title":"Journal of Computer and System Sciences"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Ingrid Biehl, Bernd Meyer: Protocols for Collusion-Secure Asymmetric Fingerprinting; accepted for 14th Symposium on Theoretical Aspects of Computer Science (STACS) 1997.","DOI":"10.1007\/BFb0023476"},{"key":"8_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Crypto\u2019 85","author":"G. R. Blakley","year":"1986","unstructured":"G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages; Crypto\u2019 85, LNCS 218, Springer-Verlag, Berlin 1986, 180\u2013189."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9\/8","author":"H. B\u00fcrk","year":"1990","unstructured":"Holger B\u00fcrk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers & Security 9\/8 (1990) 715\u2013721.","journal-title":"Computers & Security"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"F. M. Boland, J. J. K. \u00d3 Ruanaidh, C. Dautzenberg: Watermarking Digital Images for Copyright Protection; 5th IEE International Conference on Image Processing and its Applications, Edinburgh 1995, 326\u2013330.","DOI":"10.1049\/cp:19950674"},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Crypto\u2019 95","author":"D. Boneh","year":"1995","unstructured":"Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data; Crypto\u2019 95, LNCS 963, Springer-Verlag, Berlin 1995, 452\u2013465."},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24\/","author":"D. Chaum","year":"1981","unstructured":"David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24\/2 (1981) 84\u201388.","journal-title":"Communications of the ACM"},{"issue":"10","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28\/","author":"D. Chaum","year":"1985","unstructured":"David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28\/10 (1985) 1030\u20131044.","journal-title":"Communications of the ACM"},{"key":"8_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Crypto\u2019 94","author":"B. Chor","year":"1994","unstructured":"Benny Chor, Amos Fiat, Moni Naor: Tracing Traitors; Crypto\u2019 94, LNCS 839, Springer-Verlag, Berlin 1994, 257\u2013270."},{"key":"8_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding","author":"I. Cox","year":"1996","unstructured":"Ingemar Cox, Joe Kilian, Tom Leighton, Talal Shamoon: A Secure, Robust Watermark for Multimedia; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 185\u2013206."},{"key":"8_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/3-540-38424-3_13","volume-title":"Crypto\u2019 90","author":"Y. Desmedt","year":"1991","unstructured":"Yvo Desmedt, Moti Yung: Arbitrated Unconditionally Secure Authentication can be Unconditionally Protected Against Arbiter\u2019s Attacks; Crypto\u2019 90, LNCS 537, Springer-Verlag, Berlin 1991, 177\u2013188."},{"key":"8_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann: Trials of Traced Traitors; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 49\u201364."},{"key":"8_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Eurocrypt\u2019 96","author":"B. Pfitzmann","year":"1996","unstructured":"Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt\u2019 96, LNCS 1070, Springer-Verlag, Berlin 1996, 84\u201395."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; accepted for 4th ACM Conference on Computer and Communications Security, 1997.","DOI":"10.1145\/266420.266453"},{"key":"8_CR17","first-page":"18","volume-title":"Fingerprinting","author":"N. R. Wagner","year":"1983","unstructured":"Neal R. Wagner: Fingerprinting; 1983 Symposium on Security and Privacy, IEEE, Oakland, California, 18\u201322."},{"key":"8_CR18","volume-title":"International Congress on Intellectual Property Rights For Specialized Information, Knowledge and New Technologies","author":"J. Zhao","year":"1995","unstructured":"Jian Zhao, Eckhard Koch: Embedding Robust Labels Into Images For Copyright Protection; International Congress on Intellectual Property Rights For Specialized Information, Knowledge and New Technologies, Oldenbourg-Verlag, Vienna 1995."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:02Z","timestamp":1556724722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}