{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:48:01Z","timestamp":1747892881859,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265256","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":3,"title":["A commutative encrypted protocol for the privacy protection of watermarks in digital contents"],"prefix":"10.1109","author":[{"family":"Shing-chi Cheung","sequence":"first","affiliation":[]},{"family":"Ho-fung Leung","sequence":"additional","affiliation":[]},{"family":"Changjie Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"ref10"},{"year":"2002","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941177"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/S0167-9236(02)00067-2","article-title":"Integration of Digital Rights Management into Internet Open Trading Protocol (IOTP)","volume":"34","author":"james","year":"2003","journal-title":"Decision Support Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"journal-title":"MPEG","year":"2002","key":"ref15"},{"journal-title":"Morpheus","year":"2002","key":"ref16"},{"journal-title":"Napster","year":"2001","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57341-0_57"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1998.0391"},{"key":"ref4","first-page":"105","article-title":"Buyer-Reseller Watermarking Protocol for MP3 Music","author":"cheung","year":"2002","journal-title":"Proceedings of the 26th Annual International Computer and Applications Conference (COMPSAC 2002)"},{"key":"ref3","first-page":"202","article-title":"Privacy Protection for Transactions of Digital Contents","author":"feng","year":"2001","journal-title":"ICICS '01"},{"journal-title":"Windows Media Security Issues - White Paper [On-line]","year":"2001","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/93.959104"},{"journal-title":"Forrester Research","article-title":"Sizing Global Online Exports","year":"2000","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/BFb0054156","article-title":"Optimistic fair exchange of digital signatures","volume":"1403","author":"asokan","year":"1998","journal-title":"Advances in Cryptology-Eurocrypt'98"},{"key":"ref1","first-page":"8","article-title":"Optimistic Protocols for fair exchange","author":"asokan","year":"1997","journal-title":"4th ACM Conference on Computer and Communications Security"},{"key":"ref9","first-page":"251","article-title":"Digital watermarking and practical distribution protocol for digital contents copyright protection","author":"jun","year":"2000","journal-title":"Proceedings of the WISA'2000"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref21","article-title":"Cryptography and Network Security","author":"stallings","year":"1999","journal-title":"Principles and Practice"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265256.pdf?arnumber=1265256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:17Z","timestamp":1497585377000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265256","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}