{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:54:40Z","timestamp":1725530080324},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008429"},{"type":"electronic","value":"9783642008436"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_22","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T10:42:08Z","timestamp":1238582528000},"page":"245-256","source":"Crossref","is-referenced-by-count":0,"title":["Hash-Based Key Management Schemes for MPEG4-FGS"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Karroumi","sequence":"first","affiliation":[]},{"given":"Ayoub","family":"Massoudi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-45067-X_31","volume-title":"Information Security and Privacy","author":"G. Hanaoka","year":"2003","unstructured":"Hanaoka, G., Ogawa, K., Murota, I., Ohtake, G., Majima, K., Oyamada, K., Gohshi, S., Namba, S., Imai, H.: Separating encryption and key issuance in digital rights management systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 365\u2013376. Springer, Heidelberg (2003)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-45664-3_25","volume-title":"Public Key Cryptography","author":"M. Joye","year":"2002","unstructured":"Joye, M., Yen, S.-M.: One-way cross-trees and their applications. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 346\u2013356. Springer, Heidelberg (2002)"},{"issue":"11","key":"22_CR3","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/76.911157","volume":"11","author":"W. Li","year":"2001","unstructured":"Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Techn.\u00a011(3), 301\u2013317 (2001)","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"key":"22_CR5","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: Johnson, C., Montague, P., Steketee, C. (eds.) ACSW Frontiers. CRPIT, vol.\u00a021, pp. 49\u201358. Australian Computer Society (2003)"},{"key":"22_CR6","unstructured":"ECRYPT Yearly\u00a0Report on\u00a0Algorithms and Keysizes. D.SPA.10 Rev. 1.1. IST-2002-507932 ECRYPT (2006) (January 2007), http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.21-1.1.pdf"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message - digert Algorithm. Internet activities board, internet privacy task force, request for comments, RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"22_CR8","unstructured":"Yuan, C., Zhu, B.B., Su, M., Wang, X., Li, S., Zhong, Y.: Layered access control for MPEG-4 fgs video. In: ICIP (1), pp. 517\u2013520 (2003)"},{"key":"22_CR9","first-page":"443","volume-title":"ICME","author":"B.B. Zhu","year":"2004","unstructured":"Zhu, B.B., Feng, M., Li, S.: An efficient key scheme for layered access control of mpeg-4 fgs video. In: ICME, pp. 443\u2013446. IEEE, Los Alamitos (2004)"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TMM.2005.843340","volume":"7","author":"B.B. Zhu","year":"2005","unstructured":"Zhu, B.B., Yuan, C., Wang, Y., Li, S.: Scalable protection for MPEG-4 fine granularity scalability. IEEE Transactions on Multimedia\u00a07(2), 222\u2013233 (2005)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T03:14:03Z","timestamp":1558235643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}