{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:59Z","timestamp":1725558719211},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_12","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T15:33:06Z","timestamp":1277825586000},"page":"128-144","source":"Crossref","is-referenced-by-count":0,"title":["Combinatorial Optimization of Countermeasures against Illegal Copying"],"prefix":"10.1007","author":[{"given":"Ryoichi","family":"Sasaki","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Yoshiura","sequence":"additional","affiliation":[]},{"given":"Shinji","family":"Itoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Matsui, K.: Fundamentals of Digital Watermarking, Morikitasyuppan (1998) (in Japanese)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, A.P.(eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"issue":"7","key":"12_CR3","first-page":"1133","volume":"73","author":"R. Mori","year":"1990","unstructured":"Mori, R., Kawahara, M.: Superdistribution: the concept and the architecture. Trans. of the IEICE\u00a073(7), 1133\u20131146 (1990)","journal-title":"Trans. of the IEICE"},{"key":"12_CR4","volume-title":"Integer Programming","author":"R.S. Gerfinkel","year":"1972","unstructured":"Gerfinkel, R.S., Nemhauser, G.L.: Integer Programming. Wiley, Chichester (1972)"},{"key":"12_CR5","volume-title":"Reliability and Risk Analysis","author":"N.J. McCormic","year":"1981","unstructured":"McCormic, N.J.: Reliability and Risk Analysis. Academic Press, London (1981)"},{"issue":"SIG 15 TOD 12","key":"12_CR6","first-page":"63","volume":"42","author":"N. Sakurai","year":"2001","unstructured":"Sakurai, N., et al.: Trend on copy rights protection techniques for content distribution. Information Processing Society in Japan\u00a042(SIG 15 TOD 12), 63\u201376 (2001) (Japanese)","journal-title":"Information Processing Society in Japan"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:00:26Z","timestamp":1559214026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}