{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:10:40Z","timestamp":1730203840856,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766438","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T14:16:45Z","timestamp":1305296205000},"page":"136-140","source":"Crossref","is-referenced-by-count":7,"title":["A decentralized authorization scheme for DRM in P2P file-sharing systems"],"prefix":"10.1109","author":[{"given":"Qin","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yinyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10467-1_39"},{"key":"ref11","article-title":"Atomic Proxy Cryptography","author":"blaze","year":"1998","journal-title":"International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)"},{"key":"ref12","article-title":"Proxy Cryptography Revisited","author":"ivan","year":"2003","journal-title":"Proc 10th Annual Network and Distributed System Security Symposium (NDSS 2003)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref14","first-page":"279","article-title":"Key-private proxy re-encryption","volume":"5473","author":"ateniese","year":"2009","journal-title":"The Cryptographers' Track at the RSA Conference (CT-RSA'09) 2009"},{"year":"0","key":"ref4"},{"journal-title":"Digital Rights Management Business and Technology","year":"2002","author":"rosenblatt","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2003.1274471"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.73"},{"article-title":"Digital Rights Protection in BitTorrent-like P2P Systems","year":"2009","author":"chen","key":"ref7"},{"journal-title":"Multimedia Security Technologies for Digital Rights Management","year":"2006","author":"zeng","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.40"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_26"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766438.pdf?arnumber=5766438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:46:53Z","timestamp":1490060813000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766438","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}