{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:11Z","timestamp":1742913371791,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_27","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T22:55:47Z","timestamp":1354229747000},"page":"352-361","source":"Crossref","is-referenced-by-count":1,"title":["Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution"],"prefix":"10.1007","author":[{"given":"Xin-Wen","family":"Wu","sequence":"first","affiliation":[]},{"given":"Alan Wee-Chung","family":"Liew","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TIT.2003.809570","volume":"49","author":"A. Barg","year":"2003","unstructured":"Barg, A., Blakley, G., Kabatiansky, G.: Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory\u00a049(4), 852\u2013865 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"27_CR2","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion secure fingerprinting for digital data. IEEE Trans. Inform. Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"issue":"3","key":"27_CR4","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inform. Theory\u00a046(3), 893\u2013910 (2000)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"10","key":"27_CR5","doi-asserted-by":"publisher","first-page":"5335","DOI":"10.1109\/TIT.2010.2059470","volume":"56","author":"J. Cortrina-Navau","year":"2010","unstructured":"Cortrina-Navau, J., Fern\u00e1ndez, M.: A family of asymptotically good binary fingerprinting codes. IEEE Trans. Inform. Theory\u00a056(10), 5335\u20135343 (2010)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"12","key":"27_CR6","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1049\/el:20020409","volume":"38","author":"M. Fern\u00e1ndez","year":"2002","unstructured":"Fern\u00e1ndez, M., Soriano, M.: Algorithm to decode \u2018identifiable parent property\u2019 codes. Electronics Letters\u00a038(12), 552\u2013553 (2002)","journal-title":"Electronics Letters"},{"issue":"1","key":"27_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1049\/iet-ifs:20055145","volume":"2","author":"M. Fernandez","year":"2007","unstructured":"Fernandez, M., Soriano, M., Cotrina, J.: Tracing illegal redistribution using error-and-erasures and side information decoding algorithms. IET Inf. Secur.\u00a02(1), 83\u201390 (2007)","journal-title":"IET Inf. Secur."},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00145-001-0006-7","volume":"14","author":"A. Fiat","year":"2001","unstructured":"Fiat, A., Tassa, T.: Dynamic traitor tracing. J. Cryptology\u00a014, 211\u2013223 (2001)","journal-title":"J. Cryptology"},{"key":"27_CR9","volume-title":"Concatenated Codes","author":"G.D. Forney","year":"1966","unstructured":"Forney, G.D.: Concatenated Codes. MIT Press, Cambridge (1966)"},{"issue":"6","key":"27_CR10","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory\u00a045(6), 1757\u20131767 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1006\/jcta.1997.2851","volume":"82","author":"H. Hollmann","year":"1998","unstructured":"Hollmann, H., van Lint, J.H., Linnartz, J.-P., Linnartz, T.L.: On codes with the identifiable parent property. J. Comb. Theory A\u00a082, 121\u2013133 (1998)","journal-title":"J. Comb. Theory A"},{"key":"27_CR12","unstructured":"Peikert, C., Shelat, A., Smith, A.: Lower Bounds for Collusion-Secure Fingerprinting. In: Proc. 14th Annual ACM-SIAM Symposium on Discrete Algorithm (SODA 2003), pp. 472\u2013479 (2003)"},{"issue":"1","key":"27_CR13","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/18.817522","volume":"46","author":"R. Roth","year":"2000","unstructured":"Roth, R., Ruckenstein, G.: Efficient decoding of Reed-Solomon codes beyond half the minimum distance. IEEE Trans. Inform. Theory\u00a046(1), 246\u2013257 (2000)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"27_CR14","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"R. Safavi-Naini","year":"2003","unstructured":"Safavi-Naini, R., Wang, Y.: Sequential traitor tracing. IEEE Trans. Inform. Theory\u00a049(5), 1319\u20131326 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1109\/TIT.2003.810630","volume":"49","author":"A. Silverberg","year":"2003","unstructured":"Silverberg, A., Staddon, J., Walker, J.: Applications of list decoding to tracing traitors. IEEE Trans. Inform. Theory\u00a049(5), 1312\u20131318 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"27_CR16","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/18.915661","volume":"47","author":"J. Staddon","year":"2001","unstructured":"Staddon, J., Stinson, D., Wei, R.: Combinatorial properties of frameproof and traceability code. IEEE Trans. Inform. Theory\u00a047(3), 1042\u20131049 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10623-007-9142-x","volume":"46","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107, B., Katzenbeisser, S., Celik, M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr.\u00a046, 137\u2013166 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"27_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3810-9","volume-title":"Algebraic-Geometric Codes","author":"M.A. Tsfasman","year":"1991","unstructured":"Tsfasman, M.A., Vladut, S.G.: Algebraic-Geometric Codes. Kluwer Academic, Boston (1991)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of 35th Annual ACM Symposium on Theory of Computing (STOC), San Diego, USA, pp. 116\u2013125 (2003)","DOI":"10.1145\/780542.780561"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T20:04:02Z","timestamp":1576181042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}