{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:37Z","timestamp":1725511957879},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710929"},{"type":"electronic","value":"9783540710936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71093-6_19","type":"book-chapter","created":{"date-parts":[[2007,5,29]],"date-time":"2007-05-29T14:58:59Z","timestamp":1180450739000},"page":"237-251","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Management of OMA DRM Domains"],"prefix":"10.1007","author":[{"given":"Harikrishna","family":"Vasanta","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Nicholas Paul","family":"Sheppard","sequence":"additional","affiliation":[]},{"given":"Jan Martin","family":"Surminen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"19_CR1","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MSP.2004.1276118","volume":"21","author":"J.-P. Andreaux","year":"2004","unstructured":"Andreaux, J.-P., Durand, A., Furon, T., Diehl, E.: Copy protection system for digital home networks. IEEE Signal Processing Magazine\u00a021(2), 100\u2013108 (2004)","journal-title":"IEEE Signal Processing Magazine"},{"unstructured":"Content Management License Administrator (2006), http:\/\/www.cm-la.com","key":"19_CR2"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11552055_5","volume-title":"Communications and Multimedia Security","author":"P. Koster","year":"2005","unstructured":"Koster, P., Kamperman, F., Lenoir, P., Vrielink, K.: Identity based DRM: Personal entertainment domain. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 42\u201354. Springer, Heidelberg (2005)"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1102546.1102552","volume-title":"ACM Workshop on Digital Rights Management","author":"D.W. Kravitz","year":"2005","unstructured":"Kravitz, D.W., Messerges, T.S.: Achieving media portability through local content translation and end-to-end rights management. In: ACM Workshop on Digital Rights Management, pp. 27\u201336. ACM Press, New York (2005)"},{"unstructured":"Marlin Developer Community. Marlin \u2013 core system specification version 1.2 (12 April 2006), http:\/\/www.marlin-community.com","key":"19_CR5"},{"unstructured":"Maru\u0161i\u010d, B., de Cuetos, P., Piron, L., Lifshitz, Z.: TIRAMISU: That\u2019s unobtrusive DRM in the home domain. Indicare Monitor\u00a02(5) (2005), http:\/\/www.indicare.org\/tiki-read_article.php?articleId=125","key":"19_CR6"},{"doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, M., Galperin, S., Adams, C.: X.509 Public Key Infrastructure Online Certificate Status Protocol \u2013 OCSP. RFC 2560 (1999)","key":"19_CR7","DOI":"10.17487\/rfc2560"},{"unstructured":"Open Mobile Alliance. OMA DRM v2.0 approved enabler (3 March 2006)","key":"19_CR8"},{"issue":"2","key":"19_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2004.1276115","volume":"21","author":"F. Pestoni","year":"2004","unstructured":"Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-peer content protection. IEEE Signal Processing Magazine\u00a021(2), 71\u201381 (2004)","journal-title":"IEEE Signal Processing Magazine"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1029146.1029150","volume-title":"ACM Workshop on Digital Rights Management","author":"B.C. Popescu","year":"2004","unstructured":"Popescu, B.C., Crispo, B., Tanenbaum, A.S., Kamperman, F.L.A.J.: A DRM security architecture for home networks. In: ACM Workshop on Digital Rights Management, pp. 1\u201310. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71093-6_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:15:25Z","timestamp":1605744925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71093-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540710929","9783540710936"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71093-6_19","relation":{},"subject":[]}}