{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:55:42Z","timestamp":1743080142823,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319038889"},{"type":"electronic","value":"9783319038896"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03889-6_19","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T06:27:22Z","timestamp":1386570442000},"page":"167-176","source":"Crossref","is-referenced-by-count":2,"title":["Robust Fingerprinting Codes for Database"],"prefix":"10.1007","author":[{"given":"Thach V.","family":"Bui","sequence":"first","affiliation":[]},{"given":"Binh Q.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thuc D.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Sonehara","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Willenborg, L., Kardaun, J.: Fingerprints in microdata sets. In: CBS (1999)"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"19_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1346330.1346335","volume":"55","author":"G.. Tardos","year":"2008","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM\u00a055(2), 10 (2008)","journal-title":"J. ACM"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TDSC.2005.12","volume":"2","author":"Y. Li","year":"2005","unstructured":"Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing\u00a02(1), 34\u201345 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Guo, F., Wang, J., Li, D.: Fingerprinting relational databases. In: Proceedings of the ACM Symposium on Applied Computing, pp. 487\u2013492. ACM (2006)","DOI":"10.1145\/1141277.1141391"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on VLDB, pp. 155\u2013166 (2002)","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"issue":"5","key":"19_CR7","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K. El Emam","year":"2009","unstructured":"El Emam, K., et al.: A globally optimal k-anonymity method for the de-identification of health data. Journal of the American Medical Informatics Association\u00a016(5), 670\u2013682 (2009)","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P.. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"05","key":"19_CR9","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L.. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(05), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Indyk, P., Ngo, H.Q., Rudra, A.: Efficiently decodable non-adaptive group testing. In: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1126\u20131142. SIAM (2010)","DOI":"10.1137\/1.9781611973075.91"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-03409-1_7","volume-title":"Fundamentals of Computation Theory","author":"M. Cheraghchi","year":"2009","unstructured":"Cheraghchi, M.: Noise-resilient group testing: Limitations and constructions. In: Kuty\u0142owski, M., Charatonik, W., G\u0119bala, M. (eds.) FCT 2009. LNCS, vol.\u00a05699, pp. 62\u201373. Springer, Heidelberg (2009)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-642-36818-9_35","volume-title":"Information and Communicatiaon Technology","author":"T.V. Bui","year":"2013","unstructured":"Bui, T.V., Nguyen, O.K., Dang, V.H., Nguyen, N.T.H., Nguyen, T.D.: A variant of non-adaptive group testing and its application in pay-television via internet. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 324\u2013330. Springer, Heidelberg (2013)"},{"issue":"4","key":"19_CR13","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TIT.1964.1053689","volume":"10","author":"W. Kautz","year":"1964","unstructured":"Kautz, W., Singleton, R.: Nonrandom binary superimposed codes. IEEE Transactions on Information Theory\u00a010(4), 363\u2013377 (1964)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"19_CR14","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1214\/aoms\/1177731363","volume":"14","author":"R. Dorfman","year":"1943","unstructured":"Dorfman, R.: The detection of defective members of large populations. The Annals of Mathematical Statistics\u00a014(4), 436\u2013440 (1943)","journal-title":"The Annals of Mathematical Statistics"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/11496137_15","volume-title":"Applied Cryptography and Network Security","author":"M.T. Goodrich","year":"2005","unstructured":"Goodrich, M.T., Atallah, M.J., Tamassia, R.: Indexing information for data forensics. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 206\u2013221. Springer, Heidelberg (2005)"},{"issue":"1","key":"19_CR16","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1061318.1061325","volume":"30","author":"G. Cormode","year":"2005","unstructured":"Cormode, G., Muthukrishnan, S.: What\u2019s hot and what\u2019s not: tracking most frequent items dynamically. ACM Transactions on Database Systems (TODS)\u00a030(1), 249\u2013278 (2005)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Bui, T.V., Dang, V.H., Choi, D.: Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC\/ATC), pp. 973\u2013978. IEEE (2012)","DOI":"10.1109\/UIC-ATC.2012.18"},{"key":"19_CR18","unstructured":"Forney Jr., G.D.: Concatenated codes. DTIC Document (1965)"},{"issue":"2","key":"19_CR19","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics\u00a08(2), 300\u2013304 (1960)","journal-title":"Journal of the Society for Industrial and Applied Mathematics"},{"issue":"1","key":"19_CR20","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J. Massey","year":"1969","unstructured":"Massey, J.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory\u00a015(1), 122\u2013127 (1969)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Wicker, S.B., Bhargava, V.K.: Reed-Solomon codes and their applications. Wiley-IEEE Press (1999)","DOI":"10.1109\/9780470546345"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/978-3-540-70575-8_61","volume-title":"Automata, Languages and Programming","author":"E. Porat","year":"2008","unstructured":"Porat, E., Rothschild, A.: Explicit non-adaptive combinatorial group testing schemes. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol.\u00a05125, pp. 748\u2013759. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03889-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T21:05:30Z","timestamp":1675976730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-03889-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319038889","9783319038896"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03889-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}