{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:49:00Z","timestamp":1725796140619},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_25","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T12:05:04Z","timestamp":1403870704000},"page":"373-381","source":"Crossref","is-referenced-by-count":1,"title":["Efficient and Enhanced Solutions for Content Sharing in DRM Systems"],"prefix":"10.1007","author":[{"given":"Michal","family":"Davidson","sequence":"first","affiliation":[]},{"given":"Ehud","family":"Gudes","sequence":"additional","affiliation":[]},{"given":"Tamir","family":"Tassa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Popescu, B.C., Crispo, B., Tanenbaum, A.S., Kamperman, F.: A DRM security architecture for home networks. In: Digital Rights Management Workshop, pp. 1\u201310 (2004)","DOI":"10.1145\/1029146.1029150"},{"issue":"11","key":"25_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.4156\/jdcta.vol5.issue11.47","volume":"5","author":"G. Ma","year":"2011","unstructured":"Ma, G., Pei, Q., Jiang, X., Wang, Y.: A proxy re-encryption based sharing model for DRM. Int\u2019l J. of Digital Content Tech. and its Applications\u00a05(11), 385 (2011)","journal-title":"Int\u2019l J. of Digital Content Tech. and its Applications"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur.\u00a09(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-76929-3_13","volume-title":"Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security","author":"I.M. Abbadi","year":"2007","unstructured":"Abbadi, I.M.: Digital rights management using a master control device. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol.\u00a04846, pp. 126\u2013141. Springer, Heidelberg (2007)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Sheppard, N.P., Safavi-Naini, R.: Sharing digital rights with domain licensing. In: The ACM Workshop on Multimedia Content Protection and Security, pp. 3\u201312 (2006)","DOI":"10.1145\/1178766.1178769"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-75496-1_4","volume-title":"Information Security","author":"A.-R. Sadeghi","year":"2007","unstructured":"Sadeghi, A.-R., Wolf, M., St\u00fcble, C., Asokan, N., Ekberg, J.-E.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 53\u201370. Springer, Heidelberg (2007)"},{"issue":"4","key":"25_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10207-009-0082-5","volume":"8","author":"S. Lee","year":"2009","unstructured":"Lee, S., Kim, J., Hong, S.J.: Redistributing time-based rights between consumer devices for content sharing in DRM system. Int. J. Inf. Sec.\u00a08(4), 263\u2013273 (2009)","journal-title":"Int. J. Inf. Sec."},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory","author":"S.D. Galbraith","year":"2002","unstructured":"Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 324\u2013337. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T04:59:10Z","timestamp":1558933150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}