{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T03:47:57Z","timestamp":1727063277176},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,4,2]],"date-time":"2009-04-02T00:00:00Z","timestamp":1238630400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s10623-009-9285-z","type":"journal-article","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:42:22Z","timestamp":1238546542000},"page":"339-362","source":"Crossref","is-referenced-by-count":69,"title":["An improvement of discrete Tardos fingerprinting codes"],"prefix":"10.1007","volume":"52","author":[{"given":"Koji","family":"Nuida","sequence":"first","affiliation":[]},{"given":"Satoshi","family":"Fujitsu","sequence":"additional","affiliation":[]},{"given":"Manabu","family":"Hagiwara","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Kitagawa","sequence":"additional","affiliation":[]},{"given":"Hajime","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Kazuto","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,2]]},"reference":[{"key":"9285_CR1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10623-008-9200-z","volume":"48","author":"O. Blayer","year":"2008","unstructured":"Blayer O., Tassa T.: Improved versions of Tardos\u2019 fingerprinting scheme. Des. Codes Cryptogr. 48, 79\u2013103 (2008)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"9285_CR2","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9285_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1174-7","volume-title":"The Lebesgue-Stieltjes Integral: A Practical Introduction","author":"M. Carter","year":"2000","unstructured":"Carter M., van Brunt B.: The Lebesgue-Stieltjes Integral: A Practical Introduction. Springer-Verlag, Berlin (2000)"},{"key":"9285_CR4","unstructured":"Guth H.-J., Pfitzmann B.: Error- and collusion-secure fingerprinting for digital data. In: Proceedings of Information Hiding 1999 (IH\u201999), LNCS 1768, pp. 134\u2013145 (2000)."},{"key":"9285_CR5","doi-asserted-by":"crossref","unstructured":"Hagiwara M., Hanaoka G., Imai H.: A short random fingerprinting code against a small number of pirates. In: Proceedings of 16th Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-16), LNCS 3857, pp. 193\u2013202 (2006).","DOI":"10.1007\/11617983_19"},{"key":"9285_CR6","unstructured":"Nuida K., Hagiwara M., Watanabe H., Imai H.: Optimization of memory usage in Tardos\u2019s fingerprinting codes. Preprint at arXiv repository. http:\/\/www.arxiv.org\/abs\/cs\/0610036 (2006)."},{"key":"9285_CR7","doi-asserted-by":"crossref","unstructured":"Nuida K., Hagiwara M., Watanabe H., Imai H.: Optimization of Tardos\u2019s fingerprinting codes in a viewpoint of memory amount. In: Proceedings of 9th Information Hiding (IH 2007), LNCS 4567, pp. 279\u2013293 (2007).","DOI":"10.1007\/978-3-540-77370-2_19"},{"key":"9285_CR8","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10623-007-9142-x","volume":"46","author":"B. S\u0306kori\u0107","year":"2008","unstructured":"S\u0306kori\u0107 B., Katzenbeisser S., Celik M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46, 137\u2013166 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"9285_CR9","doi-asserted-by":"crossref","unstructured":"Tardos G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116\u2013125 (2003).","DOI":"10.1145\/780542.780561"},{"key":"9285_CR10","unstructured":"Tardos G.: Optimal probabilistic fingerprint codes. To appear in: Journal of the ACM. Preprint available online at http:\/\/www.renyi.hu\/~tardos\/publications.html ."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9285-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9285-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9285-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:26Z","timestamp":1559231906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9285-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,2]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["9285"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9285-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,2]]}}}