{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:01:48Z","timestamp":1730232108145,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199537","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T16:20:30Z","timestamp":1250007630000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Tracing Stateful Pirate Decoders"],"prefix":"10.1109","author":[{"given":"Y.","family":"Wu","sequence":"first","affiliation":[]},{"given":"F.","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.841169"},{"journal-title":"Breaking through Apple's FairPlay","year":"0","author":"evers","key":"2"},{"journal-title":"An Attack on a Traitor Tracing Scheme","year":"0","author":"yan","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47870-1_3"},{"key":"7","first-page":"573","article-title":"fully collusion resistant traitor tracing with short ciphertexts and private keys, eurocrypt","volume":"4004","author":"boneh","year":"2006","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"5","first-page":"171","article-title":"forgery attack to an asymptotically optimal traitor tracing scheme, acisp","volume":"4586","author":"wu","year":"2007","journal-title":"LNCS"},{"key":"4","first-page":"542","article-title":"public traceability in traitor tracing schemes, eurocrypt'05","volume":"3494","author":"chabanne","year":"2005","journal-title":"LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872062"},{"key":"8","first-page":"502","article-title":"threshold traitor tracing","volume":"1462","author":"naor","year":"1998","journal-title":"LNCS"},{"key":"11","first-page":"140","article-title":"a note on the limits of collusion-resistant watermarks, eurocrypt'99","volume":"1592","author":"ergun","year":"1999","journal-title":"LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199537.pdf?arnumber=5199537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T13:22:05Z","timestamp":1489756925000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199537","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}