{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:22:41Z","timestamp":1742959361332,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_19","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"234-241","source":"Crossref","is-referenced-by-count":1,"title":["Traitor Tracing without A Priori Bound on the Coalition Size"],"prefix":"10.1007","author":[{"given":"Hongxia","family":"Jin","sequence":"first","affiliation":[]},{"given":"Serdar","family":"Pehlivanoglu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-48405-1_23","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"A. Fiat","year":"1999","unstructured":"Fiat, A., Tassa, T.: Dynamic traitor tracing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 354\u2013371. Springer, Heidelberg (1999)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44598-6_20","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"R. Safavi-Naini","year":"2000","unstructured":"Safavi-Naini, R., Wang, Y.: Sequential traitor tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 316\u2013332. Springer, Heidelberg (2000)"},{"issue":"5","key":"19_CR4","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"R. Safavi-Naini","year":"2003","unstructured":"Safavi-Naini, R., Wang, Y.: Sequential traitor tracing. IEEE Transactions on Information Theory\u00a049(5), 1319\u20131326 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data (extended abstract). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/10958513_32","volume-title":"Information Security","author":"T.V. Le","year":"2003","unstructured":"Le, T.V., Burmester, M., Hu, J.: Short c-secure fingerprinting codes. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 422\u2013427. Springer, Heidelberg (2003)"},{"issue":"3","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/18.915661","volume":"47","author":"J. Staddon","year":"2001","unstructured":"Staddon, J., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Transactions on Information Theory\u00a047(3), 1042\u20131049 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1137\/S0895480196304246","volume":"11","author":"D.R. Stinson","year":"1998","unstructured":"Stinson, D.R., Wei, R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discrete Math.\u00a011(1), 41\u201353 (1998)","journal-title":"SIAM J. Discrete Math."},{"key":"19_CR9","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1145\/780542.780561","volume-title":"STOC","author":"G. Tardos","year":"2003","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116\u2013125. ACM, New York (2003)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-540-74835-9_37","volume-title":"Computer Security \u2013 ESORICS 2007","author":"H. Jin","year":"2007","unstructured":"Jin, H., Lotspiech, J.: Renewable traitor tracing: A trace-revoke-trace system for anonymous attack. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 563\u2013577. Springer, Heidelberg (2007)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Pehlivanoglu, S.: Tracing and revoking pirate rebroadcasts. In: ACNS, pp. 253\u2013271 (2009)","DOI":"10.1007\/978-3-642-01957-9_16"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: ACM Conference on Computer and Communications Security, pp. 501\u2013510 (2008)","DOI":"10.1145\/1455770.1455834"},{"key":"19_CR13","unstructured":"AACS Specifications (2006), http:\/\/www.aacsla.com\/specifications\/"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Jin, H., Lotspiech, J., Megiddo, N.: Efficient coalition detection in traitor tracing. In: SEC, pp. 365\u2013380 (2008)","DOI":"10.1007\/978-0-387-09699-5_24"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T15:51:30Z","timestamp":1685116290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}