{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T23:10:37Z","timestamp":1740525037512,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_32","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"379-390","source":"Crossref","is-referenced-by-count":1,"title":["Modifiable Digital Content Protection in P2P"],"prefix":"10.1007","author":[{"given":"Heejae","family":"Park","sequence":"first","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"http:\/\/www.napster.com"},{"key":"32_CR2","unstructured":"http:\/\/www.gnutella.com"},{"key":"32_CR3","unstructured":"http:\/\/www.kazaa.com"},{"issue":"11","key":"32_CR4","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MC.2003.1244542","volume":"36","author":"C. Lindahl","year":"2003","unstructured":"Lindahl, C., Blount, E.: Weblogs: simplifying web publishing. IEEE Computer\u00a036(11), 114\u2013116 (2003)","journal-title":"IEEE Computer"},{"issue":"4","key":"32_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"C.I. Podilchuk","year":"2001","unstructured":"Podilchuk, C.I., Delp, E.J.: Digital watermarking: Algorithms and applications. IEEE Signal Processing Magazine\u00a018(4), 33\u201346 (2001)","journal-title":"IEEE Signal Processing Magazine"},{"key":"32_CR6","unstructured":"http:\/\/www.microsoft.com\/windows\/windowsmedia\/drm.asp"},{"key":"32_CR7","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona (February 2000)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Wnag, C., Hill, J., Knight, J., Davidson, J.: Protection of Software-based Survivability Mechanisms. In: International Conference of Dependable Systems and Networks, Sweden (July 2001)","DOI":"10.21236\/ADA466288"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/3-540-49380-8_9","volume-title":"On software protection via function hiding","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: IH 1998. LNCS, vol.\u00a01525, pp. 111\u2013123. Springer, Heidelberg (1998)"},{"issue":"11","key":"32_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/35.883493","volume":"38","author":"F. Hartung","year":"2000","unstructured":"Hartung, F., Ramme, F.: Digital Rights Management and Watermarking of Multimedia Contents for M-Commerce Applications. IEEE Communicationsv Magazine\u00a038(11), 78\u201384 (2000)","journal-title":"IEEE Communicationsv Magazine"},{"key":"32_CR11","unstructured":"Stefik., Merkle.,Pirolli.: US Patent 5634012 (1997)"},{"key":"32_CR12","unstructured":"Johnson., et al.: US Patent 5991876 (1999)"},{"key":"32_CR13","unstructured":"Schneck., et al.: US Patent 5933498 (1999)"},{"key":"32_CR14","unstructured":"Kahn Robert, E., et al.: US Patent 20030115143 (2003)"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Securing xml document. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, pp. 121\u2013135. Springer, Heidelberg (2000)"},{"key":"32_CR16","unstructured":"Park, H., Kim, J.: PCMHoDC: A Scheme to Protect Copyright and Modification History of Digital Contents. In: 18th IFIP International Information Security Conference, Athens, Greece, May 26-28 (2003)"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, P., Gribble, S.: A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking (January 2002)","DOI":"10.1117\/12.449977"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Park, H., Kim, J.: Modifiable Content Protection Scheme in P2P and Its Functionalities. Technical report HPC-04-01, Dept. of CSE, POSTECH (April 2004)","DOI":"10.1007\/978-3-540-30144-8_32"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:38Z","timestamp":1740523058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}