{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:02Z","timestamp":1725490502873},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_18","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"201-212","source":"Crossref","is-referenced-by-count":5,"title":["Study of Digital License Search for Intellectual Property Rights of S\/W Source Code"],"prefix":"10.1007","author":[{"given":"Byungrae","family":"Cha","sequence":"first","affiliation":[]},{"given":"Kyungjun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongseob","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Iannella, R.: The Opend Digital Rights Language: XML for Digital Rights Management. Information Security Technical Report, vol.\u00a09(3), pp. 1363\u20134127. Elsevier, Amsterdam (2004)","DOI":"10.1016\/S1363-4127(04)00031-7"},{"key":"18_CR2","unstructured":"Neumann, P.G.: Principled assuredly trustworthy composable architectures, Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, Final report, SRI Project 11459 (2003)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Digital Rights Management","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A White-Box DES Implementation for DRM Applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, Springer, Heidelberg (2003)"},{"key":"18_CR4","volume-title":"Int. Workshop on Interactive Distributed Multimedia Systems\/Protocols for Multimedia Systems (IDMS\/PROMS)","author":"C.N.C. Jordan","year":"2002","unstructured":"Jordan, C.N.C., van Buuren, R., Hartel, P.H., Kleinhuis, G.: Security Attributes based Digital Rights Management. In: Int. Workshop on Interactive Distributed Multimedia Systems\/Protocols for Multimedia Systems (IDMS\/PROMS), Springer, Heidelberg (2002)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Privacy Engineering for Digital Rights Management Systems. In: Proceedings of the 2001 ACM Workshop on Security and Privacy in Digital Rights Management, pp. 76\u2013105 (2001)","DOI":"10.1007\/3-540-47870-1_6"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/35.883493","volume":"38","author":"F. Hartung","year":"2000","unstructured":"Hartung, F., Ramme, F.: Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Communications Magazine\u00a038, 78\u201384 (2000)","journal-title":"IEEE Communications Magazine"},{"key":"18_CR7","unstructured":"Rieger, M., Ducasse, S.: Visual Detection of Duplicated Code. In: Proceedings ECOOP Workshop on Experiences in Object-Oriented Re-Engineering (1988)"},{"issue":"7","key":"18_CR8","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1002\/spe.4380210706","volume":"21","author":"W. Yang","year":"1991","unstructured":"Yang, W.: Identifying Syntactic Differences Between Two Programs. Software-Practice and Experience\u00a021(7), 739\u2013755 (1991)","journal-title":"Software-Practice and Experience"},{"key":"18_CR9","unstructured":"http:\/\/www.few.vu.nl\/dick\/sim.html"},{"key":"18_CR10","unstructured":"http:\/\/glimpse.arizona.edu\/javadup.html"},{"key":"18_CR11","unstructured":"http:\/\/www.ccsr.cam.ac.uk\/mw263\/YAP.html"},{"key":"18_CR12","unstructured":"http:\/\/www.cs.berkeley.edu\/aikem\/moss.html"},{"key":"18_CR13","unstructured":"dong-uk, C.: S\/W Program Plagiarism Inspection Techniques and Analysis of S\/W Tools for Protection of Digital Properties. In: Proceeding of the Korea Contents Association, vol. 1(1) (2003)"},{"key":"18_CR14","unstructured":"Garms, J., Somerfield, D.: Professional Java Security, Wrox (2001)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Lautenbach, B.: Introduction to XML Encryption and XML Signature. In: Information Security Technical Report, vol.\u00a09(3), pp. 1363\u20134127. Elsevier, Amsterdam (April 2004)","DOI":"10.1016\/S1363-4127(04)00028-7"},{"key":"18_CR16","unstructured":"Hatcher, E., Gospodnetic, O.: Lucene in Action, Manning (December 2004)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Cha, B.: Business Model and comparison of S\/W Source Code vs. Digital License for IPRs, LNAI 4496, pp. 825\u2013832 (June 2007)","DOI":"10.1007\/978-3-540-72830-6_86"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:33:17Z","timestamp":1619519597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_18","relation":{},"subject":[]}}