{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:34:48Z","timestamp":1725424488960},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766640","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T14:16:45Z","timestamp":1305296205000},"page":"912-917","source":"Crossref","is-referenced-by-count":0,"title":["Content usage tracking in superdistribution"],"prefix":"10.1109","author":[{"given":"Di","family":"Ma","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Mitigating insider threats with incentives","author":"liu","year":"0","journal-title":"FCM'09"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/13691180210159328"},{"key":"ref12","article-title":"Compact proofs of retrievability","author":"shacham","year":"2008","journal-title":"ASIACRYPT'08"},{"journal-title":"The web bug FAQ","year":"0","author":"smith","key":"ref13"},{"article-title":"Methods, media and systems for tracking, encrypting, and determining content us-age, and identifying large content files","year":"0","author":"tomas","key":"ref14"},{"journal-title":"Introduction to Dataveillance and Information Privacy and Definitions of Terms","year":"0","author":"clarke","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029160"},{"article-title":"Methods, media, and systems for tracking content usage over a network","year":"0","author":"fisher","key":"ref5"},{"journal-title":"RFC 2109 HTTP State Management Mechanism","year":"0","author":"kristol","key":"ref8"},{"key":"ref7","article-title":"Pors: proofs of retrievability for large files","author":"juels","year":"2008","journal-title":"ACM-CCS'08"},{"key":"ref2","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2008","journal-title":"ACM-CCS'08"},{"journal-title":"OpenSSL","year":"0","key":"ref1"},{"article-title":"Method, system and recording medium for collecting contents usage information","year":"0","author":"kyung","key":"ref9"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766640.pdf?arnumber=5766640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:25:03Z","timestamp":1490059503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766640","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}