{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:52Z","timestamp":1725471772150},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_16","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T10:51:56Z","timestamp":1160563916000},"page":"173-184","source":"Crossref","is-referenced-by-count":2,"title":["A Flexible and Open DRM Framework"],"prefix":"10.1007","author":[{"given":"Kristof","family":"Verslype","sequence":"first","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Atallah, M.J., Bryant, E.D., Stytz, M.R.: A survey of Anti-Tamper Technologies (2004)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/11551492_25","volume-title":"Digital Watermarking","author":"M. Castro Pacitti de","year":"2005","unstructured":"de Castro Pacitti, M., Finamore, W.A.: Digital watermarking robustness and fragility characteristics: New modelling and coding influence. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 325\u2013335. Springer, Heidelberg (2005)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Proceedings of ACM CCS-9 Workshop DRM 2002","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A White-Box DES Implementation for DRM applications. In: Proceedings of ACM CCS-9 Workshop DRM 2002. LNCS, vol.\u00a02595, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: White-Box Cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E.: Dynamic Self Checking Techniques for Improved Tamper Resistance. In: ACM Workshop on Security and Privacy in Digital Rights Management, pp. 141\u2013159 (2001)","DOI":"10.1007\/3-540-47870-1_9"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-540-30144-8_33","volume-title":"Information Security","author":"W. Ku","year":"2004","unstructured":"Ku, W., Chi-Hung, C.: Survey on the Technological Aspects of Digital Rights Management. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 391\u2013403. Springer, Heidelberg (2004)"},{"key":"16_CR7","unstructured":"Windows Media DRM 10 cracked? (2005), http:\/\/www.engadget.com\/2005\/02\/01\/windows-media-drm-10-cracked\/"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: DRM 2005: Proceedings of the 5th ACM workshop on Digital rights management (2005)","DOI":"10.1145\/1102546.1102559"},{"key":"16_CR9","unstructured":"Microsoft Next Generation Secure Computing Base, http:\/\/www.microsoft.com\/resources\/ngscb\/default.mspx"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Proudler, G.J.: Concepts of Trusted Computing. IEE Professional Applications of Computing Series, vol.\u00a06 (2005)","DOI":"10.1049\/PBPC006E_ch2"},{"key":"16_CR11","unstructured":"Reid, J.F., Caelli, W.J.: DRM, Trusted Computing and Operating System Architecture (2005)"},{"key":"16_CR12","unstructured":"Trusted Computing Group. TCG TPM Specification Version 1.2 (2006), Revision 94, https:\/\/www.trustedcomputinggroup.org\/specs\/TPM"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Verslype, K., De Decker, B.: A Flexible and Open DRM construction. KULeuven dept. computer science, technical report (2006)","DOI":"10.1007\/11909033_16"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T12:36:06Z","timestamp":1555850166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11909033_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}