{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T20:10:22Z","timestamp":1739304622235,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_23","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"252-267","source":"Crossref","is-referenced-by-count":3,"title":["Classification Framework for Fair Content Tracing Protocols"],"prefix":"10.1007","author":[{"given":"Geong Sen","family":"Poh","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: Proceedings of 4th ACM Conference on Computer and Communications Security, pp. 7\u201317 (1997)","DOI":"10.1145\/266420.266426"},{"key":"23_CR2","series-title":"Information Security and Cryptography Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography Series. Springer, Heidelberg (2003)"},{"issue":"1988","key":"23_CR3","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., Crepeau, C.: Minimum Disclosure Proofs of Knowledge. Journal of Computer and System Sciences\u00a037(1988), 156\u2013189 (1988)","journal-title":"Journal of Computer and System Sciences"},{"key":"23_CR4","volume-title":"Digital Watermarking and Steganography","author":"I.J. Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)","edition":"2"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Deng, M., Preneel, B.: Attacks On Two Buyer-Seller Watermarking Protocols And An Improvement For Revocable Anonymity. In: IEEE International Symposium on Electronic Commerce and Security - ISECS 2008 (2008)","DOI":"10.1109\/ISECS.2008.103"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S. (ed.): List of potential applications interested by s.p.e.d. D3.1, Philips Research (Philips), for Signal Processing in the Encrypted Domain (SPEED) Project, IST-2006-034238, Information Society Technologies (2007), http:\/\/www.speedproject.eu","DOI":"10.1155\/2007\/82790"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/MUE.2007.102","volume-title":"Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE 2007)","author":"C.-I. Fan","year":"2007","unstructured":"Fan, C.-I., Chen, M.-T., Sun, W.-Z.: Buyer-Seller Watermarking Protocols with Off-line Trusted Parties. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 1035\u20131040. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/978-3-540-74472-6_77","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"B.-M. Goi","year":"2007","unstructured":"Goi, B.-M., Phan, R.C.-W., Chuah, H.-T.: Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. LNCS, vol.\u00a04705, pp. 951\u2013960. Springer, Heidelberg (2007)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the seventeenth annual ACM symposium on Theory of computing, pp. 291\u2013304 (1985)","DOI":"10.1145\/22145.22178"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/IAS.2007.39","volume-title":"Third International Symposium on Information Assurance and Security (IAS 2007)","author":"I.M. Ibrahim","year":"2007","unstructured":"Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An Effective and Secure Buyer-Seller Watermarking Protocol. In: Third International Symposium on Information Assurance and Security (IAS 2007), pp. 21\u201326. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"23_CR11","unstructured":"Federal information processing standards\u00a0(fips 180-2). Secure Hash Standard (2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/3-540-36552-4_29","volume-title":"Information Security and Cryptology - ICISC 2002","author":"H.S. Ju","year":"2003","unstructured":"Ju, H.S., Kim, H.-J., Lee, D.-H., Lim, J.-I.: An anonymous buyer-seller watermarking protocol with anonymity control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 421\u2013432. Springer, Heidelberg (2003)"},{"issue":"12","key":"23_CR13","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C.-L. Lei","year":"2004","unstructured":"Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a013(12), 1618\u20131626 (2004)","journal-title":"IEEE Trans. on Image Processing"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Leung, A., Poh, G.S.: An Anonymous Watermarking Scheme for Content Distribution Protection using Trusted Computing. In: SECRYPT 2007 - International Conference on Security and Cryptography, pp. 319\u2013326. INSTICC Press (2007)","DOI":"10.5220\/0002124803190326"},{"issue":"4","key":"23_CR15","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"key":"23_CR19","first-page":"457","volume-title":"International Workshop on Data Hiding for Information and Multimedia Security attached to IAS 2007","author":"G.S. Poh","year":"2007","unstructured":"Poh, G.S., Martin, K.M.: A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. In: International Workshop on Data Hiding for Information and Multimedia Security attached to IAS 2007, pp. 457\u2013461. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"IWDW 2008","author":"G.S. Poh","year":"2008","unstructured":"Poh, G.S., Martin, K.M.: An Efficient Buyer-Seller Watermarking Scheme Based on Chameleon Encryption. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol.\u00a05450. Springer, Heidelberg (to appear)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Poh, G.S., Martin, K.M.: On the (In)security of Two Buyer-Seller Watermarking Protocols. In: SECRYPT 2008 - International Conference on Security and Cryptography, pp. 253\u2013260 (2008)","DOI":"10.5220\/0001919702530260"},{"issue":"3","key":"23_CR22","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"2","key":"23_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"2","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. of the ACM\u00a02(2), 120\u2013126 (1978)","journal-title":"Commun. of the ACM"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/10941270_9","volume-title":"Digital Rights Management","author":"A.-R. Sadeghi","year":"2003","unstructured":"Sadeghi, A.-R., Schneider, M.: Electronic Payment Systems. In: Becker, E., Buhse, W., G\u00fcnnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol.\u00a02770, pp. 113\u2013137. Springer, Heidelberg (2003)"},{"key":"23_CR25","unstructured":"Trusted Computing\u00a0Group (TCG). Trusted computing group website (accessed, February 2009), http:\/\/www.trustedcomputinggroup.org"},{"key":"23_CR26","unstructured":"Tomlinson, A.: Application and Business Security: Payment and e-commerce applications. Lecture Notes IY5601, MSc. of Information Security, Information Security Group, Royal Holloway, University of London (2008)"},{"key":"23_CR27","volume-title":"Proceedings of the 10th ACM Workshop on Multimedia and Security (MM & Sec. 2008)","author":"D.M. Williams","year":"2008","unstructured":"Williams, D.M., Treharne, H., Ho, A.T.S.: Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol. In: Proceedings of the 10th ACM Workshop on Multimedia and Security (MM & Sec. 2008). ACM, New York (2008)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"IWDW 2008","author":"D.M. Williams","year":"2008","unstructured":"Williams, D.M., Treharne, H., Ho, A.T.S., Walker, A.: Formal Analysis of Two Buyer-Seller Watermarking Protocols. In: Anthony, T.S., Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol.\u00a05450. Springer, Heidelberg (to appear)"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Wu, Y., Pang, H.: A Lightweight Buyer-Seller Watermarking Protocol. In: Advances in Multimedia 2008, vol.\u00a0905065, 7 pages (2008) doi:10.1155\/2008\/905065","DOI":"10.1155\/2008\/905065"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:30:22Z","timestamp":1739302222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}