{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:55:41Z","timestamp":1729677341616,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/allerton.2013.6736699","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T17:46:12Z","timestamp":1392313572000},"page":"1458-1465","source":"Crossref","is-referenced-by-count":12,"title":["Efficient probabilistic group testing based on traitor tracing"],"prefix":"10.1109","author":[{"given":"Thijs","family":"Laarhoven","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Optimal symmetric tardos traitor tracing schemes","author":"laarhoven","year":"2012","journal-title":"Designs Codes and Cryptography"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/s00145-001-0006-7"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/TIFS.2011.2168212"},{"key":"15","first-page":"7","article-title":"Bounds on the length of disjunctive codes","volume":"18","author":"dyachkov","year":"1982","journal-title":"Problemy Peredachi Informatsii"},{"key":"16","first-page":"237","article-title":"Superimposed distance codes","volume":"18","author":"dyachkov","year":"1989","journal-title":"Problems of Control and Information Theory"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.jalgor.2004.03.001"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1214\/aoms\/1177731363"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ALLERTON.2010.5707016"},{"key":"12","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/11889342_45","article-title":"Threshold group testing","volume":"4123","author":"damaschke","year":"2006","journal-title":"General Theory of Inf Transfer and Combinatorics"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/TIT.2013.2251756"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/WIFS.2012.6412656"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/WIFS.2013.6707817"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1134\/S0032946010010011"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/ICASSP.2011.5947280"},{"key":"25","first-page":"19","article-title":"A capacity-achieving simple decoder for bias-based traitor tracing schemes","author":"oosterwijk","year":"2013","journal-title":"Submitted A Preliminary Version Appeared in 1st ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/0378-3758(85)90022-9"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/ALLERTON.2010.5707018"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1007\/s10623-007-9142-x"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1145\/780559.780561"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TIT.2011.2178156"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ALLERTON.2009.5394787"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TIT.2011.2148691"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/ISIT.2012.6283596"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1007\/s00145-004-0214-z"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/Allerton.2011.6120391"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/18.705568"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1007\/s10623-008-9200-z"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ISIT.2013.6620712"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ALLERTON.2009.5394829"},{"year":"2013","author":"chan","journal-title":"Near-optimal Stochastic Threshold Group Testing","key":"8"}],"event":{"name":"2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2013,10,2]]},"location":"Monticello, IL","end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6725831\/6736491\/06736699.pdf?arnumber=6736699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:51:19Z","timestamp":1498103479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6736699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/allerton.2013.6736699","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}