{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:05:10Z","timestamp":1725638710526},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272035"},{"type":"electronic","value":"9783642272042"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27204-2_45","type":"book-chapter","created":{"date-parts":[[2011,12,3]],"date-time":"2011-12-03T09:38:41Z","timestamp":1322905121000},"page":"377-386","source":"Crossref","is-referenced-by-count":0,"title":["Content Authentication Scheme for Modifiable Multimedia Streams"],"prefix":"10.1007","author":[{"given":"Hankyu","family":"Joo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Silberschatz, Galvin, Gagne: Operating System Concepts, 8th edn. Wiley (2008)","key":"45_CR1"},{"key":"45_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 180\u2013197. Springer, Heidelberg (1997)"},{"unstructured":"Golle, P., Modagudu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001, pp. 13\u201322 (2001)","key":"45_CR3"},{"unstructured":"Zhang, Z., Sun, Q., Wong, W.: A Proposal of butterfly-graph based stream authentication over lossy networks. In: ICME 2005, pp. 784\u2013787 (2005)","key":"45_CR4"},{"doi-asserted-by":"crossref","unstructured":"Hefeeda, M., Mokhtarian, K.: Authentication Schemes for Multimedia Streams: Quantitative Analysis and Comparison. ACM Tran. Multimedia Communications and Applications\u00a06(1), Article 6 (2010)","key":"45_CR5","DOI":"10.1145\/1671954.1671960"},{"unstructured":"Digital Signature Standard, FIPS 186, NIST (1994)","key":"45_CR6"},{"unstructured":"Secure Hash Standard, FIPS 180-1, NIST (1995)","key":"45_CR7"},{"key":"45_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-30598-9_12","volume-title":"Security in Communication Networks","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 165\u2013179. Springer, Heidelberg (2005)"},{"key":"45_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable Signatures. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 159\u2013177. Springer, Heidelberg (2005)"},{"key":"45_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-00468-1_18","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"C. Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schr\u00f6der, D., Volk, F.: Security of Sanitizable Signatures Revisited. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 317\u2013336. Springer, Heidelberg (2009)"}],"container-title":["Communications in Computer and Information Science","Multimedia, Computer Graphics and Broadcasting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27204-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T03:15:00Z","timestamp":1561000500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27204-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272035","9783642272042"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27204-2_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}