{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T21:44:36Z","timestamp":1648763076745},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T00:00:00Z","timestamp":1164758400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,1,9]]},"DOI":"10.1007\/s10623-006-9030-9","type":"journal-article","created":{"date-parts":[[2006,11,28]],"date-time":"2006-11-28T13:09:07Z","timestamp":1164719347000},"page":"195-212","source":"Crossref","is-referenced-by-count":0,"title":["Sliding-window dynamic frameproof codes"],"prefix":"10.1007","volume":"42","author":[{"given":"Maura","family":"Paterson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,11,29]]},"reference":[{"key":"9030_CR1","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1137\/S0097539700367984","volume":"30","author":"O Berkman","year":"2001","unstructured":"Berkman O, Parnas M, Sgall J (2001) Efficient dynamic traitor tracing. SIAM J Comput 30:1802\u20131828","journal-title":"SIAM J Comput"},{"key":"9030_CR2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1017\/CBO9781107359970.004","volume-title":"Surveys in combinatorics 2003, vol 307 of LMS lecture notes series","author":"SR Blackburn","year":"2003","unstructured":"Blackburn SR (2003) Combinatorial schemes for protecting digital content. In: Wensley CD (ed) Surveys in combinatorics 2003, vol 307 of LMS lecture notes series. Cambridge University Press, Cambridge, MA, pp 43\u201378"},{"issue":"3","key":"9030_CR3","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1137\/S0895480101384633","volume":"16","author":"SR Blackburn","year":"2003","unstructured":"Blackburn SR (2003) Frameproof codes. SIAM J Discrete Math 16(3):499\u2013510","journal-title":"SIAM J Discrete Math"},{"issue":"5","key":"9030_CR4","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inform Theory 44(5):1897\u20131905","journal-title":"IEEE Trans Inform Theory"},{"key":"9030_CR5","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1049\/el:20001324","volume":"36","author":"GD Cohen","year":"2000","unstructured":"Cohen GD, Encheva SB (2000) Efficient constructions of frameproof codes. Elect Lett 36:1849\u20131842","journal-title":"Elect Lett"},{"key":"9030_CR6","doi-asserted-by":"crossref","unstructured":"Fiat A, Tassa T (1999) Dynamic traitor tracing. Advances in cryptology -Crypto \u201999, vol 1666 of LNCS, Springer-Verlag, Berlin, pp 354\u2013371","DOI":"10.1007\/3-540-48405-1_23"},{"key":"9030_CR7","unstructured":"Paterson MB (2005) Dynamic frameproof codes. PhD thesis, University of London"},{"key":"9030_CR8","unstructured":"Paterson MB (2005) Sequential and dynamic frameproof codes. Preprint"},{"key":"9030_CR9","doi-asserted-by":"crossref","first-page":"3029","DOI":"10.1109\/18.959283","volume":"47","author":"R Safavi-Naini","year":"2001","unstructured":"Safavi-Naini R, Wang Y (2001) New results on frameproof codes and traceability schemes. IEEE Trans Inform Theory 47:3029\u20133033","journal-title":"IEEE Trans Inform Theory"},{"key":"9030_CR10","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"R Safavi-Naini","year":"2003","unstructured":"Safavi-Naini R, Wang Y (2003) Sequential traitor tracing. IEEE Trans Inform Theory 49:1319\u20131326","journal-title":"IEEE Trans Inform Theory"},{"key":"9030_CR11","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/18.915661","volume":"47","author":"JN Staddon","year":"2001","unstructured":"Staddon JN, Stinson DR, Wei R (2001) Combinatorial properties of frameproof and traceability codes. IEEE Trans Inform Theory 47:1024\u20131049","journal-title":"IEEE Trans Inform Theory"},{"key":"9030_CR12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1137\/S0895480196304246","volume":"11","author":"DR Stinson","year":"1998","unstructured":"Stinson DR, Wei R (1998) Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J Discrete Math 11:41\u201353","journal-title":"SIAM J Discrete Math"},{"key":"9030_CR13","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"MD Swanson","year":"1998","unstructured":"Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86:1064\u20131087","journal-title":"Proc IEEE"},{"issue":"2","key":"9030_CR14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s00145-004-0214-z","volume":"18","author":"T Tassa","year":"2005","unstructured":"Tassa T (2005) Low bandwidth dynamic traitor tracing schemes. J Crypto 18(2):167\u2013183","journal-title":"J Crypto"},{"issue":"11","key":"9030_CR15","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1109\/TIT.2002.804111","volume":"48","author":"C Xing","year":"2002","unstructured":"Xing C (2002) Asymptotic bounds on frameproof codes. IEEE Trans Inform Theory 48(11):2991\u20132995","journal-title":"IEEE Trans Inform Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9030-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-006-9030-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9030-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:50:07Z","timestamp":1559231407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-006-9030-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,29]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,1,9]]}},"alternative-id":["9030"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9030-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,11,29]]}}}