{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:49Z","timestamp":1725518389462},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_19","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"255-266","source":"Crossref","is-referenced-by-count":1,"title":["SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow"],"prefix":"10.1007","author":[{"given":"Alain","family":"Durand","sequence":"first","affiliation":[]},{"given":"Marc","family":"\u00c9luard","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Lelievre","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Vincent","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Fake DVD seizures up 41% on 2004(last visited May 2008), \n                  \n                    http:\/\/news.bbc.co.uk\/1\/hi\/entertainment\/film\/4099696.stm"},{"key":"19_CR2","unstructured":"MPA 2005 US piracy fact sheet (last visited Febuary 2008), \n                  \n                    http:\/\/www.mpaa.org\/USPiracyFactSheet.pdf"},{"key":"19_CR3","unstructured":"Advanced Access Content System for Pre-recorded Book (AACS), v0.91, February 17, 2006 (last visited Febuary 2008), \n                  \n                    http:\/\/www.aacsla.com\/specifications\/"},{"key":"19_CR4","unstructured":"CSS Description (last visited Febuary 2008) , \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Content_Scramble_System"},{"key":"19_CR5","unstructured":"DCI Specifications (last visited Febuary 2008), \n                  \n                    http:\/\/www.dcimovies.com\/specification\/index.tt2"},{"key":"19_CR6","unstructured":"Broadcast Flag Description (last visited Febuary 2008), \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Broadcast_flag"},{"key":"19_CR7","unstructured":"CPCM Description (last visited Febuary 2008), \n                  \n                    http:\/\/www.dvb.org\/technology\/dvb-cpcm\/"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Byers, S., Cranor, L., Cronin, E., Kormann, D., McDaniel, P.: Analysis of security vulnerabilities in the movie production and distribution process. In: ACM workshop on Digital rights management, October 27 (2003)","DOI":"10.1145\/947380.947383"},{"key":"19_CR9","unstructured":"http:\/\/o.seattletimes.nwsource.com\/html\/movies\/2004016889_gangster16.html\n                  \n                  \n                 (last visited Febuary 2008)"},{"key":"19_CR10","unstructured":"http:\/\/news.bbc.co.uk\/1\/hi\/entertainment\/4650956.stm\n                  \n                  \n                 (last visited Febuary 2008)"},{"key":"19_CR11","unstructured":"NexGuard Content Protection (last visited Febuary 2008), \n                  \n                    http:\/\/www.thomson.net\/GlobalEnglish\/Products\/content-tracking-and-security\/nexguard\/nexguard-content-protection\/Pages\/default.aspx"},{"key":"19_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES \u2013 the Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES \u2013 the Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"issue":"6","key":"19_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T23:16:39Z","timestamp":1551568599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}