{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T07:17:00Z","timestamp":1649056620729},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,2,3]],"date-time":"2007-02-03T00:00:00Z","timestamp":1170460800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,3,5]]},"DOI":"10.1007\/s10623-006-9037-2","type":"journal-article","created":{"date-parts":[[2007,2,3]],"date-time":"2007-02-03T07:14:47Z","timestamp":1170486887000},"page":"317-326","source":"Crossref","is-referenced-by-count":0,"title":["Sequential and dynamic frameproof codes"],"prefix":"10.1007","volume":"42","author":[{"given":"Maura","family":"Paterson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,3]]},"reference":[{"key":"9037_CR1","doi-asserted-by":"crossref","unstructured":"Blackburn SR (2003) Combinatorial schemes for protecting digital content. Surveys in combinatorics 2003. LMS lecture notes series, vol 307. pp 43\u201378","DOI":"10.1017\/CBO9781107359970.004"},{"issue":"3","key":"9037_CR2","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1137\/S0895480101384633","volume":"16","author":"SR Blackburn","year":"2003","unstructured":"Blackburn SR (2003) Frameproof codes. SIAM J Discrete Math 16(3):499\u2013510","journal-title":"SIAM J Discrete Math"},{"issue":"5","key":"9037_CR3","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44(5):1897\u20131905","journal-title":"IEEE Trans Inf Theory"},{"key":"9037_CR4","doi-asserted-by":"crossref","unstructured":"Chor B, Fiat A, Naor M (1994) Tracing traitors. Advances in cryptology\u2014crypto \u201994. Lecture notes in computer science, vol 839. pp 257\u2013270","DOI":"10.1007\/3-540-48658-5_25"},{"key":"9037_CR5","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1049\/el:20001324","volume":"36","author":"GD Cohen","year":"2000","unstructured":"Cohen GD, Encheva SB (2000) Efficient constructions of frameproof codes. Electron Lett 36:1849\u20131842","journal-title":"Electron Lett"},{"key":"9037_CR6","doi-asserted-by":"crossref","unstructured":"Fiat A, Tassa T (1999) Dynamic traitor tracing. Advances in cryptology\u2014crypto \u201999. Lecture notes in computer science, vol 1666. pp 354\u2013371","DOI":"10.1007\/3-540-48405-1_23"},{"issue":"5","key":"9037_CR7","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TIT.2003.810629","volume":"49","author":"R Safavi-Naini","year":"2003","unstructured":"Safavi-Naini R, Wang Y (2003) Sequential traitor tracing. IEEE Trans Inf Theory 49(5):1319\u20131326","journal-title":"IEEE Trans Inf Theory"},{"key":"9037_CR8","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/18.915661","volume":"47","author":"JN Staddon","year":"2001","unstructured":"Staddon JN, Stinson DR, Wei R (2001) Combinatorial properties of frameproof and traceability codes. IEEE Trans Inf Theory 47:1024\u20131049","journal-title":"IEEE Trans Inf Theory"},{"key":"9037_CR9","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"MD Swanson","year":"1998","unstructured":"Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86:1064\u20131087","journal-title":"Proc IEEE"},{"issue":"2","key":"9037_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s00145-004-0214-z","volume":"18","author":"T Tassa","year":"2005","unstructured":"Tassa T (2005) Low bandwidth dynamic traitor tracing schemes. J. Cryptol 18(2):167\u2013183","journal-title":"J. Cryptol"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9037-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-006-9037-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9037-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:07Z","timestamp":1559245807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-006-9037-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,3]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,3,5]]}},"alternative-id":["9037"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9037-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2,3]]}}}