{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:26:58Z","timestamp":1725852418457},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_14","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"163-175","source":"Crossref","is-referenced-by-count":0,"title":["Fingerprinting for Broadcast Content Distribution System"],"prefix":"10.1007","author":[{"given":"Minoru","family":"Kuribayashi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2007.70241","volume":"5","author":"E Bertino","year":"2008","unstructured":"Bertino, E., Shang, N., Wagstaff Jr., S.S.: An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Trans. Dependable Secure Comput. 5(2), 65\u201370 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"14_CR2","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-24178-9_4","volume-title":"Information Hiding","author":"A Charpentier","year":"2011","unstructured":"Charpentier, A., Fontaine, C., Furon, T., Cox, I.: An asymmetric fingerprinting scheme based on Tardos codes. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 43\u201358. Springer, Heidelberg (2011)"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B Chor","year":"2000","unstructured":"Chor, B., Fiat, A., Naor, M., Pinkas, B.: Trating traitors. IEEE Trans. Inform. Theory 46(3), 893\u2013910 (2000)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"A Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00145-001-0006-7","volume":"14","author":"A Fiat","year":"2001","unstructured":"Fiat, A., Tassa, T.: Dynamic traitor tracing. J. Cryptology 14, 211\u2013223 (2001)","journal-title":"J. Cryptology"},{"issue":"12","key":"14_CR7","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","volume":"14","author":"M Kuribayashi","year":"2005","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129\u20132139 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"10","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1093\/ietfec\/e89-a.4.1108","volume":"E89\u2013A","author":"M Kuribayashi","year":"2006","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for on-line trade using information gap between buyer and merchant. IEICE Trans. Fundam. E89\u2013A(10), 1108\u20131115 (2006)","journal-title":"IEICE Trans. Fundam."},{"issue":"7","key":"14_CR9","doi-asserted-by":"publisher","first-page":"4230","DOI":"10.1109\/TIT.2013.2251756","volume":"59","author":"T Laarhoven","year":"2013","unstructured":"Laarhoven, T.: Dynamic Tardos traitor tracing schemes. IEEE Trans. Inform. Theory 59(7), 4230\u20134242 (2013)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"RS Naini","year":"2003","unstructured":"Naini, R.S., Wang, Y.: Sequential trating traitors. IEEE Trans. Inform. Theory 49(5), 1319\u20131326 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT 1996","author":"B Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1346330.1346335","volume":"55","author":"G Tardos","year":"2008","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 1\u201324 (2008)","journal-title":"J. ACM"},{"issue":"4","key":"14_CR14","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wong, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51(4), 804\u2013821 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/69.979981","volume":"14","author":"WG Tzeng","year":"2002","unstructured":"Tzeng, W.G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowl. Data Eng. 14(1), 182\u2013188 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T04:49:25Z","timestamp":1548046165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}