{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T22:22:17Z","timestamp":1747520537387},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icde.2004.1320029","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T13:50:22Z","timestamp":1096379422000},"page":"584-595","source":"Crossref","is-referenced-by-count":50,"title":["Proving ownership over categorical data"],"prefix":"10.1109","author":[{"given":"R.","family":"Sion","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Digital watermarking","author":"cox","year":"2001","journal-title":"Digital Watermarking"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"10","article-title":"On watermarking numeric sets","author":"sion","year":"2002","journal-title":"Proceedings of IWDW 2002 Lecture Notes in Computer Science CERIAS TR 2001-60"},{"key":"1","article-title":"Natural language watermarking and tamperproofing","author":"atallah","year":"2002","journal-title":"Lecture Notes in Computer Science Proc 5th International Information Hiding Workshop 2002"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"6","article-title":"Watermarking relational databases","author":"kiernan","year":"2002","journal-title":"Proceedings of the 28th International Conference on Very Large Databases VLDB"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773172"},{"key":"9","article-title":"Applied cryptography: Protocols, algorithms and source code in c","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"key":"8","article-title":"A first course in probability","author":"ross","year":"2001","journal-title":"A First Course in Probability"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2002.1000367"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872772"}],"event":{"name":"Proceedings. 20th International Conference on Data Engineering","acronym":"ICDE-04","location":"Boston, MA, USA"},"container-title":["Proceedings. 20th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9217\/29235\/01320029.pdf?arnumber=1320029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T16:59:12Z","timestamp":1489510752000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1320029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icde.2004.1320029","relation":{},"subject":[]}}