{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:40Z","timestamp":1725538900125},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_24","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"278-292","source":"Crossref","is-referenced-by-count":2,"title":["Formal Analysis of Two Buyer-Seller Watermarking Protocols"],"prefix":"10.1007","author":[{"given":"David M.","family":"Williams","sequence":"first","affiliation":[]},{"given":"Helen","family":"Treharne","sequence":"additional","affiliation":[]},{"given":"Anthony T. S.","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Waller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Williams, D.M., Treharne, H., Ho, A.T.S., Culnane, C.: Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol"},{"issue":"4","key":"24_CR2","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer seller watermarking protocol. IEEE Transactions on Image Processing\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Poh, G.S., Martin, K.M.: A framework for design and analysis of asymmetric fingerprinting protocols. In: Third International Symposium on Information Assurance and Security, pp. 457\u2013461 (2007)","DOI":"10.1109\/IAS.2007.64"},{"key":"24_CR4","unstructured":"Shao, M.H.: A privacy-preserving buyer-seller watermarking protocol with semi-trust third party"},{"issue":"12","key":"24_CR5","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C.L. Lei","year":"2004","unstructured":"Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing\u00a013(12), 1618\u20131626 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"24_CR6","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"24_CR7","volume-title":"The Modelling and Analysis of Security Protocols","author":"A.W. Roscoe","year":"2001","unstructured":"Roscoe, A.W., Ryan, P., Schneider, S., Goldsmith, M., Lowe, G.: The Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An effective and secure buyer seller watermarking protocol. In: Third International Symposium on Information Assurance and Security, pp. 21\u201328 (2007)","DOI":"10.1109\/IAS.2007.39"},{"key":"24_CR9","volume-title":"Communicating sequential processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Prentice-Hall International, Englewood Cliffs (1985)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"24_CR11","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile (1999)","DOI":"10.17487\/rfc2459"},{"key":"24_CR13","unstructured":"Formal Systems. FDR 2.82. Formal Systems Ltd. (2005)"},{"key":"24_CR14","volume-title":"The Theory and Practice of Concurrency","author":"A.W. Roscoe","year":"1998","unstructured":"Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice Hall, Englewood Cliffs (1998)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. In: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pp. 147\u2013166 (1996)","DOI":"10.1007\/3-540-61042-1_43"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:36:58Z","timestamp":1558550218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}