{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:19:12Z","timestamp":1729653552664,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/apscc.2008.129","type":"proceedings-article","created":{"date-parts":[[2009,2,13]],"date-time":"2009-02-13T14:46:34Z","timestamp":1234536394000},"page":"1344-1351","source":"Crossref","is-referenced-by-count":0,"title":["Laundering and Repackaging of Multimedia Content in Content Distribution Systems"],"prefix":"10.1109","author":[{"given":"Alain","family":"Durand","sequence":"first","affiliation":[]},{"given":"Marc","family":"Joye","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Karroumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","article-title":"broadcast encryption","author":"fiat","year":"1994","journal-title":"Advances in Cryptology- CRYPTO'93 volume 773 of Lecture Notes in Computer Sciences"},{"key":"2","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/DEXA.2003.1232053","article-title":"privacy in an identity-based drm system","author":"conrado","year":"2003","journal-title":"Proc 14th Int l Workshop Database and Expert Systems Applications (Dexa 03)"},{"key":"10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","article-title":"revocation and tracing schemes for stateless receivers","author":"naor","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771077"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11876601_29"},{"journal-title":"Advanced Access Content System (AACS) Introduction and Common Cryptographic Elements Feb 17","year":"2006","key":"6"},{"journal-title":"Content Protection for Recordable Media Introduction and Common Cryptographic Elements","year":"2000","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1006\/inco.2000.2916","article-title":"how to sign digital streams","volume":"165","author":"gennaro","year":"2001","journal-title":"Information and Computation"},{"key":"9","first-page":"461","author":"miller","year":"1999","journal-title":"Digital Signal Processing for Multimedia Systems"},{"key":"8","first-page":"104","article-title":"identity-based drm: personal entertainment domain","volume":"4300","author":"koster","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"}],"event":{"name":"2008 IEEE Asia-Pacific Services Computing Conference (APSCC)","start":{"date-parts":[[2008,12,9]]},"location":"Yilan, Taiwan","end":{"date-parts":[[2008,12,12]]}},"container-title":["2008 IEEE Asia-Pacific Services Computing Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4780614\/4780615\/04780866.pdf?arnumber=4780866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T12:45:09Z","timestamp":1497789909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4780866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/apscc.2008.129","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}