{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:09:00Z","timestamp":1765368540396},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055750","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T17:12:36Z","timestamp":1154020356000},"page":"502-517","source":"Crossref","is-referenced-by-count":72,"title":["Threshold traitor tracing"],"prefix":"10.1007","author":[{"given":"Moni","family":"Naor","sequence":"first","affiliation":[]},{"given":"Benny","family":"Pinkas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/18.119713","volume":"38","author":"N. Alon","year":"1992","unstructured":"N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, vol. 38 (1992), 509\u2013516.","journal-title":"IEEE Transactions on Information Theory"},{"key":"35_CR2","unstructured":"N. Alon and J. Spencer, The Probabilistic Method, Wiley, 1992."},{"key":"35_CR3","unstructured":"R. Anderson and M. Kuhn, Tamper Resistance \u2014 A Cautionary Note, Usenix Electronic Commerce Workshop, Oakland (1996), 1\u201311."},{"key":"35_CR4","first-page":"513","volume":"1294","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Proc. Advances in Cryptology \u2014 Crypto '97, Springr-Verlag LNCS 1294 (1997), 513\u2013525.","journal-title":"Springr-Verlag LNCS"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"D. Boneh, R. A. Demillo and R. J. Lipton, On the Importance of Checking Computations, Proc. Advances in Cryptology \u2014 Eurocrypt '97 (1997), 37\u201351.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital date, Proc. Advances in Cryptology \u2014 Crypto '95 (1995), 452\u2013465.","DOI":"10.1007\/3-540-44750-4_36"},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter and M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences 18 (1979), 143\u2013154.","journal-title":"Journal of Computer and System Sciences"},{"key":"35_CR8","first-page":"257","volume":"839","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat and M. Naor, Tracing Traitors, Proc. Advances in Cryptology \u2014 Crypto '94, Springr-Verlag LNCS 839 (1994), 257\u2013270.","journal-title":"Springr-Verlag LNCS"},{"key":"35_CR9","unstructured":"B. Chor, A. Fiat, M. Naor and B. Pinkas, Tracing Traitors, manuscript, (1998)."},{"key":"35_CR10","first-page":"185","volume":"1174","author":"I. Cox","year":"1996","unstructured":"Cox I., Kilian J., Leighton T. and Shamoon T., A Secure, Robust Watermark for Multimedia, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 185\u2013206.","journal-title":"Springer-Verlag LNCS"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"C. Dwork, J. Lotspiech and M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, 28th Symposium on the Theory of Computation (1996), 489\u2013498.","DOI":"10.1145\/237814.237997"},{"key":"35_CR12","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erd\u00f6s","year":"1985","unstructured":"P. Erd\u00f6s, P. Frankl and Z. F\u00fcredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51 (1985), 79\u201389.","journal-title":"Israel J. of math."},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"A. Fiat and M. Naor, Broadcast Encryption, Proc. Advances in Cryptology \u2014 Crypto '93 (1994), 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1145\/828.1884","volume":"31","author":"M.L. Fredman","year":"1984","unstructured":"M.L. Fredman, J. Koml\u00f3s and E. Szemer\u00e9di, Storing a Sparse Table with O(1) Worst Case Access Time, Journal of the ACM, Vol 31 (1984), 538\u2013544.","journal-title":"Journal of the ACM"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"K. Mehlhorn, Data Structures and Algorithms: Sorting and Searching, Springer-Verlag (1984).","DOI":"10.1007\/978-3-642-69672-5"},{"key":"35_CR16","volume-title":"The Theory of Error Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, North Holland, Amsterdam, (1977)."},{"key":"35_CR17","first-page":"49","volume":"1174","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 49\u201364.","journal-title":"Springer-Verlag LNCS"},{"key":"35_CR18","unstructured":"D.M. Wallner, E. J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, internet draft draft-wallner-key-arch-00.txt (1997). Available at ftp:\/\/ietf.org\/internet-drafts\/draft-wallner-key-arch-00.txt"},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22 (1981), 265\u2013279.","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T05:08:58Z","timestamp":1555736938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/bfb0055750","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}