{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:50:34Z","timestamp":1725616234639},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cec.2013.6557853","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T14:57:12Z","timestamp":1374764232000},"page":"2376-2383","source":"Crossref","is-referenced-by-count":6,"title":["DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution"],"prefix":"10.1109","author":[{"given":"David","family":"Megias","sequence":"first","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402999"},{"key":"15","first-page":"88","article-title":"Anonymous fingerprinting","author":"pfitzmann","year":"1997","journal-title":"Advances in Cryptology-EUROCRYPT'96 LNCS 1233"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/780559.780561"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.05.012"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77224-8_12"},{"key":"11","first-page":"43","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"IPTPS 2002-First International Workshop on Peer-to-Peer Systems LNCS 2429"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0307-3"},{"key":"3","first-page":"415","article-title":"Efficient anonymous fingerprinting with group signatures","author":"camenisch","year":"2000","journal-title":"ASIACRYPT 2000 LNCS 1976"},{"key":"2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","article-title":"Collusion-secure fingerprinting for digital data","author":"boneh","year":"1995","journal-title":"Advances in Cryptology-CRYPTO'95 LNCS 963"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74377-4_86"},{"journal-title":"The EDonkey 2000 Protocol KOM Technical Report 08\/2002 Ver 0 8 Department of Electrical Engineering","year":"2002","author":"heckmann","key":"10"},{"key":"7","first-page":"43","article-title":"Anonymous fingerprinting based on committed oblivious transfer","author":"domingo-ferrer","year":"1999","journal-title":"Public Key Cryptography-PKC 1999 LNCS 1560"},{"journal-title":"Digital Watermarking and Steganography","year":"2008","author":"cox","key":"6"},{"journal-title":"The BitTorrent Protocol Spec Ification","year":"2008","author":"cohen","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"oldberg","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/el:20001231"}],"event":{"name":"2013 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2013,6,20]]},"location":"Cancun, Mexico","end":{"date-parts":[[2013,6,23]]}},"container-title":["2013 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6552460\/6557545\/06557853.pdf?arnumber=6557853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:49:26Z","timestamp":1498049366000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6557853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cec.2013.6557853","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}