{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:10:11Z","timestamp":1750792211087,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":13,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3105831.3105860","type":"proceedings-article","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T19:35:01Z","timestamp":1501270501000},"page":"176-183","source":"Crossref","is-referenced-by-count":1,"title":["WFinger"],"prefix":"10.1145","author":[{"given":"Bettina","family":"Fazzinga","sequence":"first","affiliation":[{"name":"ICAR-CNR, Rende (CS), Italy"}]},{"given":"Sergio","family":"Flesca","sequence":"additional","affiliation":[{"name":"DIMES, University of Calabria, Rende (CS), Italy"}]},{"given":"Filippo","family":"Furfaro","sequence":"additional","affiliation":[{"name":"DIMES, University of Calabria, Rende (CS), Italy"}]},{"given":"Elio","family":"Masciari","sequence":"additional","affiliation":[{"name":"ICAR-CNR, Rende (CS), Italy"}]}],"member":"320","reference":[{"key":"key-10.1145\/3105831.3105860-1","doi-asserted-by":"crossref","unstructured":"E. Amiri and G. Tardos. High rate fingerprinting codes and the fingerprinting capacity. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pages 336--345, 2009.","DOI":"10.1137\/1.9781611973068.38"},{"key":"key-10.1145\/3105831.3105860-2","doi-asserted-by":"crossref","unstructured":"T. Furon and M. Desoubeaux. Tardos codes for real. In 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014, pages 24--29, 2014.","DOI":"10.1109\/WIFS.2014.7084298"},{"key":"key-10.1145\/3105831.3105860-3","doi-asserted-by":"crossref","unstructured":"M. S. Kankanhalli and K. Hau. Watermarking of electronic text documents. Electronic Commerce Research, 2(1):169--187, 2002.","DOI":"10.1023\/A:1013312707578"},{"key":"key-10.1145\/3105831.3105860-4","doi-asserted-by":"crossref","unstructured":"A. Kot. Watermarking, data hiding and image forensic. In 2005 5th International Conference on Information Communications Signal Processing, pages nil94--nil94, 2005.","DOI":"10.1109\/ICICS.2005.1688987"},{"key":"key-10.1145\/3105831.3105860-5","doi-asserted-by":"crossref","unstructured":"S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O'Gorman. Document marking and identification using both line and word shifting. In INFOCOM '95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People. Proceedings. IEEE, pages 853--860 vol. 2, 1995.","DOI":"10.1109\/INFCOM.1995.515956"},{"key":"key-10.1145\/3105831.3105860-6","unstructured":"J. Nielsen. Fingerprinting plain text information, Sept. 14 1999. US Patent 5,953,415."},{"key":"key-10.1145\/3105831.3105860-7","doi-asserted-by":"crossref","unstructured":"K. Nuida. Short collusion-secure fingerprint codes against three pirates. In Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers, pages 86--102, 2010.","DOI":"10.1007\/978-3-642-16435-4_8"},{"key":"key-10.1145\/3105831.3105860-8","doi-asserted-by":"crossref","unstructured":"K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe, K. Ogawa, and H. Imai. An improvement of discrete tardos fingerprinting codes. Des. Codes Cryptography, 52(3):339--362, 2009.","DOI":"10.1007\/s10623-009-9285-z"},{"key":"key-10.1145\/3105831.3105860-9","doi-asserted-by":"crossref","unstructured":"B. Skoric, S. Katzenbeisser, and M. U. Celik. Symmetric tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptography, 46(2):137--166, 2008.","DOI":"10.1007\/s10623-007-9142-x"},{"key":"key-10.1145\/3105831.3105860-10","doi-asserted-by":"crossref","unstructured":"B. Skoric, T. U. Vladimirova, M. U. Celik, and J. Talstra. Tardos fingerprinting is better than we thought. IEEE Trans. Information Theory, 54(8):3663--3676, 2008.","DOI":"10.1109\/TIT.2008.926307"},{"key":"key-10.1145\/3105831.3105860-11","doi-asserted-by":"crossref","unstructured":"G. Tardos. Optimal probabilistic fingerprint codes. In Conference Proceedings of the Annual ACM Symposium on Theory of Computing, pages 116--125, 2003.","DOI":"10.1145\/780542.780561"},{"key":"key-10.1145\/3105831.3105860-12","doi-asserted-by":"crossref","unstructured":"G. Tardos. Optimal probabilistic fingerprint codes. Journal of the ACM, 55(2), 2008.","DOI":"10.1145\/1346330.1346335"},{"key":"key-10.1145\/3105831.3105860-13","doi-asserted-by":"crossref","unstructured":"G. Tardos. Capacity of collusion secure fingerprinting - A tradeoff between rate and efficiency, volume 6387 LNCS of Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010.","DOI":"10.1007\/978-3-642-16435-4_7"}],"event":{"number":"21","sponsor":["Univ of the West of England, University of the West of England","BytePress","Concordia University"],"acronym":"IDEAS 2017","name":"the 21st International Database Engineering & Applications Symposium","start":{"date-parts":[[2017,7,12]]},"location":"Bristol, United Kingdom","end":{"date-parts":[[2017,7,14]]}},"container-title":["Proceedings of the 21st International Database Engineering &amp; Applications Symposium on - IDEAS 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3105831.3105860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3105860&ftid=1896569&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T18:41:44Z","timestamp":1750790504000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3105831.3105860"}},"subtitle":["a joint-decoder for very short Tardos fingerprinting codes"],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1145\/3105831.3105860","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}