{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T01:14:22Z","timestamp":1745370862290},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dexa.2003.1232053","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"389-395","source":"Crossref","is-referenced-by-count":23,"title":["Privacy in an identity-based DRM system"],"prefix":"10.1109","author":[{"given":"C.","family":"Conrado","sequence":"first","affiliation":[]},{"given":"F.","family":"Kamperman","sequence":"additional","affiliation":[]},{"given":"G.J.","family":"Schrijen","sequence":"additional","affiliation":[]},{"given":"W.","family":"Jonker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Privacy and Accountability in Certificate Systems","author":"aura","year":"2000","journal-title":"Research Report A61"},{"year":"1996","author":"schneier","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/BF00124891"},{"year":"1999","author":"oishi","journal-title":"Unconditionally Anonymous Public-key Certificates and their applications","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/352600.352609"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/358549.358563"},{"key":"ref7","article-title":"A Technical Overview of Digital Credentials","author":"brands","year":"2002","journal-title":"International Journal of Information Security"},{"key":"ref2","article-title":"SPKI requirements","author":"ellison","year":"1999","journal-title":"RFC 2692 IETF Network Working Group Internet document"},{"year":"2001","author":"tsiounis","article-title":"Anonymity & Privacy: The InternetCash Example","key":"ref9"},{"year":"0","journal-title":"The Napster system","key":"ref1"}],"event":{"acronym":"DEXA-03","name":"14th International Workshop on Database and Expert Systems Applications","location":"Prague, Czech Republic"},"container-title":["14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8719\/27592\/01232053.pdf?arnumber=1232053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:34:20Z","timestamp":1489430060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1232053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/dexa.2003.1232053","relation":{},"subject":[]}}