{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:44Z","timestamp":1725538904375},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_36","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"433-447","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption"],"prefix":"10.1007","author":[{"given":"Geong Sen","family":"Poh","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/11780656_12","volume-title":"Information Security and Privacy","author":"A. Adelsbach","year":"2006","unstructured":"Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 136\u2013147. Springer, Heidelberg (2006); Also, Technical Report detailing the ACISP 2006 paper"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-39799-X_15","volume-title":"Advances in Cryptology","author":"G.R. Blakley","year":"1986","unstructured":"Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting Long Forgiving Messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 180\u2013189. Springer, Heidelberg (1986)"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-45203-4_21","volume-title":"Applied Cryptography and Network Security","author":"J.-G. Choi","year":"2003","unstructured":"Choi, J.-G., Sakurai, K., Park, J.-H.: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 265\u2013279. Springer, Heidelberg (2003)"},{"issue":"12","key":"36_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. on Image Processing"},{"key":"36_CR5","volume-title":"2008 International Conference on Internet and Web Applications and Services","author":"M. Deng","year":"2008","unstructured":"Deng, M., Preneel, B.: On Secure and Anonymous Buyer-Seller Watermarking Protocol. In: 2008 International Conference on Internet and Web Applications and Services. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"36_CR6","unstructured":"Dierks, T., Rescorla, E.: The TLS Protocol Version 1.1. In: RFC 4346 (2006)"},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-24852-1_27","volume-title":"Applied Cryptography and Network Security","author":"B.-M. Goi","year":"2004","unstructured":"Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 369\u2013382. Springer, Heidelberg (2004)"},{"key":"36_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/IAS.2007.39","volume-title":"Third International Symposium on Information Assurance and Security (IAS 2007)","author":"I.M. Ibrahim","year":"2007","unstructured":"Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An Effective and Secure Buyer-Seller Watermarking Protocol. In: Third International Symposium on Information Assurance and Security (IAS 2007), pp. 21\u201326. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/3-540-36552-4_29","volume-title":"Information Security and Cryptology - ICISC 2002","author":"H.S. Ju","year":"2003","unstructured":"Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 421\u2013432. Springer, Heidelberg (2003)"},{"key":"36_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-77370-2_20","volume-title":"Information Hiding","author":"S. Katzenbeisser","year":"2008","unstructured":"Katzenbeisser, S., Skori\u0107, B., Celik, M.U., Sadeghi, A.-R.: Combining Tardos Fingerprinting Codes and Fingercasting. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 294\u2013310. Springer, Heidelberg (2008)"},{"key":"36_CR11","unstructured":"Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98, Princeton University, Department of Computer Science (1988), ftp:\/\/ftp.cs.princeton.edu\/techreports\/1998\/585.ps.gz"},{"key":"36_CR12","unstructured":"RSA Labs. RSA Signature Scheme with Appendix - Probabilistic Signature Scheme (2000), ftp:\/\/ftp.rsasecurity.com\/pub\/rsalabs\/rsa_algorithm\/nessie_pss.zip"},{"issue":"12","key":"36_CR13","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C.-L. Lei","year":"2004","unstructured":"Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a013(12), 1618\u20131626 (2004)","journal-title":"IEEE Trans. on Image Processing"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Ray Liu, K.J., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia Fingerprinting Forensics for Traitor Tracing. EURASIP Book Series on Signal Processing and Communication, vol.\u00a04. Hindawi Publishing Corporation (2005)","DOI":"10.1155\/9789775945181"},{"issue":"4","key":"36_CR15","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE Trans. on Image Processing"},{"key":"36_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"key":"36_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"36_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-48910-X_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"B. Pfitzmann","year":"1999","unstructured":"Pfitzmann, B., Sadeghi, A.-R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 150\u2013164. Springer, Heidelberg (1999)"},{"key":"36_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"issue":"3","key":"36_CR21","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L. Qiao","year":"1998","unstructured":"Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownerships and customer\u2019s rights. Journal of Visual Communication and Image Representation\u00a09(3), 194\u2013210 (1998)","journal-title":"Journal of Visual Communication and Image Representation"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:37:00Z","timestamp":1558550220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}