{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:39:44Z","timestamp":1725485984011},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441373"},{"type":"electronic","value":"9783540457053"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45705-4_34","type":"book-chapter","created":{"date-parts":[[2007,6,12]],"date-time":"2007-06-12T20:28:50Z","timestamp":1181680130000},"page":"324-332","source":"Crossref","is-referenced-by-count":0,"title":["Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing"],"prefix":"10.1007","author":[{"given":"Hyung-Woo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sung-Min","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Im-Yeong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,20]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature problems, Advances in Cryptology-CRYPTO\u2019 86, LNCS Proceedings, Springer-Verlag, pp.186\u2013194, 1987.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"34_CR2","unstructured":"A. Fiat and A. Shamir: Unforgeable Proofs of Identity, Proceedings of Securicom\u201987, Paris, pp.147\u2013153, 1987."},{"key":"34_CR3","unstructured":"A. W. Roscoe, M. H. Goldsmith: The Perfect\u2019 spy\u2019 for model checking cryptoprotocols, In Proceedings of the DIMACS Workshopon Design and Formal Verification of Security Protocols, 1997"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone (ed.): Handbook of Applied Cryptography, CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"B. Chor, A. Fiat and M. Naor: Tracing Traitors, Advances in Cryptology-CRYPTO\u201994, LNCS Proceedings, Springer-Verlag, pp.257\u2013262, 1995.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann: Trials of Traced Traitors, Information Hiding, First International Workshop, LNCS Proceedings, Springer-Verlag, pp.49\u201364, 1996.","DOI":"10.1007\/3-540-61996-8_31"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann, M. Waidner: Asymmetric Fingerprinting for Larger Collusions, IBM Research Report, 1996.","DOI":"10.1145\/266420.266453"},{"issue":"4","key":"34_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-30","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, pp.469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"D. Boneh, M. Franklin: An Efficient Public Key Traitor Tracing Scheme, Advances in Cryptology-CRYPTO\u2019 99, LNCS Proceedings, Springer-Verlag, pp.338\u2013353, 1999.","DOI":"10.1007\/3-540-48405-1_22"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"D. Boneh, J. Shaw: Collusion-Secure Fingerprinting for Digital Data, Advances in Cryptology-CRYPTO\u2019 95, LNCS Proceedings, Springer-Verlag, pp.452\u2013465, 1995.","DOI":"10.1007\/3-540-44750-4_36"},{"key":"34_CR11","unstructured":"B. Schneier: Applied Cryptography, Second Edition, Wiley, 1996."},{"issue":"6","key":"34_CR12","first-page":"472","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp.472\u2013492, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"K. Kurosawa, Y. Desmedt: Optimun Traitor Tracing and Asymmetric Schemes, Advances in Cryptology-EUROCRYPT\u2019 98, LNCS Proceedings, Springer-Verlag, 1999.","DOI":"10.1007\/BFb0054123"},{"key":"34_CR14","unstructured":"M. Rabin: How to Exchange Secrets by Oblivious Transfer, Technical Reports TR-81, Harvard Aiken Computation Laboratory, 1981."}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45705-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T22:09:43Z","timestamp":1556489383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45705-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441373","9783540457053"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45705-4_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}