{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:10:27Z","timestamp":1725804627876},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_13","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T06:55:22Z","timestamp":1409986522000},"page":"183-187","source":"Crossref","is-referenced-by-count":4,"title":["Lime: Data Lineage in the Malicious Environment"],"prefix":"10.1007","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Niklas","family":"Grimm","sequence":"additional","affiliation":[]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Chronology of data breaches, \n                    \n                      http:\/\/www.privacyrights.org\/data-breach"},{"key":"13_CR2","unstructured":"Data breach cost, \n                    \n                      http:\/\/www.symantec.com\/about\/news\/release\/article.jsp?prid=20110308_01"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-74124-4_10","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2007","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: A computational model for watermark robustness. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 145\u2013160. Springer, Heidelberg (2007)"},{"key":"13_CR4","unstructured":"Backes, M., Grimm, N., Kate, A.: Lime: Data lineage in the malicious environment (2014), \n                    \n                      http:\/\/arxiv.org\/abs\/1408.1076"},{"key":"13_CR5","unstructured":"Mascher-Kampfer, A., St\u00f6gner, H., Uhl, A.: Multiple re-watermarking scenarios. In: IWSSIP, pp. 53\u201356 (2006)"},{"key":"13_CR6","unstructured":"Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA, pp. 448\u2013457 (2001)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Transactions on Knowledge and Data Engineering, 51\u201363 (2011)","DOI":"10.1109\/TKDE.2010.100"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Asymmetric fingerprinting for larger collusions. In: CCS, pp. 151\u2013160 (1997)","DOI":"10.1145\/266420.266453"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:23:10Z","timestamp":1558974190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}