{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:03Z","timestamp":1745968203262,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_35","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T16:14:54Z","timestamp":1362413694000},"page":"324-330","source":"Crossref","is-referenced-by-count":4,"title":["A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet"],"prefix":"10.1007","author":[{"given":"Thach V.","family":"Bui","sequence":"first","affiliation":[]},{"given":"Oanh K.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Van H.","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Nhung T. H.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thuc D.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Indyk, P., Ngo, H.Q., Rudra, A.: Efficiently decodable non-adaptive group testing. In: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1126\u20131142 (2010)","DOI":"10.1137\/1.9781611973075.91"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Bui, T.V., Dang, V.H., Choi, D.: Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC\/ATC), pp. 973\u2013978. IEEE (2012)","DOI":"10.1109\/UIC-ATC.2012.18"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Meerwald, P., Furon, T.: Group testing meets traitor tracing. In: 2011 IEEE Inter. Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4204\u20134207 (2011)","DOI":"10.1109\/ICASSP.2011.5947280"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Alekhnovich, M.: Linear Diophantine equations over polynomials and soft decoding of Reed-Solomon codes. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 439\u2013448. IEEE (2002)","DOI":"10.1109\/SFCS.2002.1181968"},{"key":"35_CR5","unstructured":"Parvaresh, F., Vardy, A.: Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005). IEEE (2005)"},{"issue":"2","key":"35_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/14241270209389986","volume":"4","author":"C. Lbbecke","year":"2002","unstructured":"Lbbecke, C., Falkenberg, M.: A framework for assessing market entry opportunities for internet-based TV. Inter. J. on Media Management\u00a04(2), 95\u2013104 (2002)","journal-title":"Inter. J. on Media Management"},{"key":"35_CR7","unstructured":"Population Reference Bureau: Population data sheet. Population Reference Bureau, Washington, DC (2011)"},{"issue":"5","key":"35_CR8","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TMM.2004.834861","volume":"6","author":"Y.-L. Huang","year":"2004","unstructured":"Huang, Y.-L., Shieh, S., Ho, F.-S., Wang, J.-C.: Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Transactions on Multimedia\u00a06(5), 760\u2013769 (2004)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"6","key":"35_CR9","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"B.M. Macq","year":"1995","unstructured":"Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE\u00a083(6), 944\u2013957 (1995)","journal-title":"Proceedings of the IEEE"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Kim, C., Hwang, Y., Lee, P.: Practical pay-TV scheme using traitor tracing scheme for multiple channels. Information Security Applications, 264\u2013277 (2005)","DOI":"10.1007\/978-3-540-31815-6_22"},{"issue":"5","key":"35_CR11","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1587\/transinf.E92.D.876","volume":"92","author":"S. Hou","year":"2009","unstructured":"Hou, S., Uehara, T., Satoh, T., Morimura, Y., Minoh, M.: Fingerprinting codes for Internet-based live pay-TV system using balanced incomplete block designs. IEICE Transactions on Information and Systems\u00a092(5), 876\u2013887 (2009)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"D. Boneh","year":"1999","unstructured":"Boneh, D., Franklin, M.K.: An Efficient Public Key Traitor Scheme (Extended Abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 338\u2013353. Springer, Heidelberg (1999)"},{"key":"35_CR14","unstructured":"Elias, P.: List decoding for noisy channels. Massachusetts Institute of Technology. Research Laboratory of Electronics (1957)"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"List Decoding of Error-Correcting Codes","author":"V. Guruswami","year":"2004","unstructured":"Guruswami, V.: List Decoding of Error-Correcting Codes. LNCS, vol.\u00a03282. Springer, Heidelberg (2004)"},{"key":"35_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-45682-1_11","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Silverberg","year":"2001","unstructured":"Silverberg, A., Staddon, J., Walker, J.L.: Efficient Traitor Tracing Algorithms Using List Decoding. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 175\u2013192. Springer, Heidelberg (2001)"},{"issue":"4","key":"35_CR17","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TIT.1964.1053689","volume":"10","author":"W.H. Kautz","year":"1964","unstructured":"Kautz, W.H., Singleton, R.C.: Nonrandom binary Superimposed codes. IEEE Transactions on Information Theory\u00a010(4), 363\u2013377 (1964)","journal-title":"IEEE Transactions on Information Theory"},{"key":"35_CR18","unstructured":"Dingzhu, D., Hwang, F.: Combinatorial group testing and its applications. World Scientific Publishing Company Incorporated (1993)"},{"issue":"4","key":"35_CR19","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1214\/aoms\/1177731363","volume":"14","author":"R. Dorfman","year":"1943","unstructured":"Dorfman, R.: The detection of defective members of large populations. The Annals of Mathematical Statistics\u00a014(4), 436\u2013440 (1943)","journal-title":"The Annals of Mathematical Statistics"},{"key":"35_CR20","unstructured":"Froney Jr., G.D.: Concatenated codes. DTIC Document (1965)"},{"issue":"2","key":"35_CR21","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics\u00a08(2), 300\u2013304 (1960)","journal-title":"Journal of the Society for Industrial and Applied Mathematics"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Wicker, S.B., Bhargava, V.K.: Reed-Solomon codes and their applications. Wiley-IEEE Press (1999)","DOI":"10.1109\/9780470546345"},{"key":"35_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/11496137_15","volume-title":"Applied Cryptography and Network Security","author":"M.T. Goodrich","year":"2005","unstructured":"Goodrich, M.T., Atallah, M.J., Tamassia, R.: Indexing Information for Data Forensics. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 206\u2013221. Springer, Heidelberg (2005)"},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Cormode, G., Muthukrishnan, S.: What\u2019s hot and what\u2019s not: tracking most frequent items dynamically. In: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 296\u2013306. ACM (2003)","DOI":"10.1145\/773153.773182"},{"key":"35_CR25","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1090\/dimacs\/055\/13","volume":"55","author":"H.Q. Ngo","year":"2000","unstructured":"Ngo, H.Q., Du, D.Z.: A survey on combinatorial group testing algorithms with applications to DNA library screening. Discrete Mathematical Problems with Medical Applications\u00a055, 171\u2013182 (2000)","journal-title":"Discrete Mathematical Problems with Medical Applications"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:54:22Z","timestamp":1745967262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}