{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:32:29Z","timestamp":1725528749306},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icme.2002.1035853","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:34:26Z","timestamp":1056584066000},"page":"601-604","source":"Crossref","is-referenced-by-count":0,"title":["k-time encryption for k-time licensing"],"prefix":"10.1109","author":[{"given":"G.","family":"Perkins","sequence":"first","affiliation":[]},{"given":"P.","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Digital Video An Introduction to Mpee-2","year":"1997","author":"haskell","key":"17"},{"key":"18","first-page":"1","article-title":"On the (im)possibility of obfuscating programs","author":"barak","year":"2001","journal-title":"Crypto"},{"key":"15","article-title":"A new algorithm for mpeg video encryption","author":"qiao","year":"1997","journal-title":"CISST'97 (International Conference on Imaging Science Systems and Technology)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(98)00033-8"},{"journal-title":"Data encryption standard","year":"1993","author":"nist","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/290747.290758"},{"journal-title":"Apparatus and method for serializing and validating copies of computer software","year":"0","author":"samson","key":"11"},{"journal-title":"Computer software security system","year":"0","author":"joshi","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793242618"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-314X(80)90084-0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80043-8"},{"journal-title":"Method and system of using personal information as a key when distributing information","year":"0","author":"civanla","key":"10"},{"key":"7","article-title":"Protecting software code by guards","author":"chang","year":"2001","journal-title":"ACM Workshop on Security and Privacy in Digital Rights Management"},{"journal-title":"Software Tamper Resistance Obstructing Static Analysis of Programs","year":"0","author":"wang","key":"6"},{"key":"5","first-page":"317","article-title":"Tamper resistant software: An implementation","author":"aucsmith","year":"1996","journal-title":"Information Hiding Volume 1174 of Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283736"},{"journal-title":"Software fingerprinting and branding","year":"0","author":"steinberg","key":"9"},{"key":"8","article-title":"Dynamic self-checking techniques for improved tamper resistance","author":"home","year":"2001","journal-title":"ACM Workshop on Security and Privacy in Digital Rights Management"}],"event":{"name":"IEEE International Conference on Multimedia and Expo (ICME)","acronym":"ICME-02","location":"Lausanne, Switzerland"},"container-title":["Proceedings. IEEE International Conference on Multimedia and Expo"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8044\/22221\/01035853.pdf?arnumber=1035853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T21:40:00Z","timestamp":1489182000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1035853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icme.2002.1035853","relation":{},"subject":[]}}