{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:00:21Z","timestamp":1729634421883,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscas.2005.1465184","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T17:52:28Z","timestamp":1122486748000},"page":"2703-2706","source":"Crossref","is-referenced-by-count":5,"title":["A Framework of Scalable Layered Access Control for Multimedia"],"prefix":"10.1109","author":[{"given":"B.B.","family":"Zhu","sequence":"first","affiliation":[]},{"family":"Shipeng Li","sequence":"additional","affiliation":[]},{"family":"Min Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"497","article-title":"the group diffie-hellman problems","volume":"2501","author":"bresson","year":"2002","journal-title":"LNCS"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"15"},{"key":"16","first-page":"31","article-title":"diffie-hellman key distribution extended to group communication","author":"steiner","year":"1996","journal-title":"Proc ACM Conf Computer & Comm Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2004.1394224"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1466082"},{"key":"11","first-page":"517","article-title":"layered access control for mpeg-4 fgs video","volume":"1","author":"yuan","year":"2003","journal-title":"IEEE Int Conf Image Processing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.843340"},{"key":"3","first-page":"37","article-title":"efficient and universal scalable video coding","volume":"2","author":"wu","year":"2002","journal-title":"IEEE Int Conf Image Processing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/76.911157"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(01)00024-8"},{"key":"10","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1117\/12.449744","article-title":"authentication and access control in the jpeg 2000 compressed domain","volume":"4472","author":"grosbois","year":"2001","journal-title":"Proc SPIE 46th Annual Meeting Applications of Digital Image Processing XXIV"},{"journal-title":"Architecture of Windows Media Rights Manager","year":"0","key":"7"},{"year":"0","key":"6"},{"year":"2004","key":"5","article-title":"wg11 14496-13:2004(e), information technology - coding of audio-visual object - part 13: intellectual property management and protection (ipmp) extensions"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641126"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035846"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/12.571869"}],"event":{"name":"2005 IEEE International Symposium on Circuits and Systems","location":"Kobe, Japan"},"container-title":["2005 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9898\/31469\/01465184.pdf?arnumber=1465184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:35:28Z","timestamp":1497648928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1465184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscas.2005.1465184","relation":{},"subject":[]}}