{ "labelLang" : "hun", "responseDate" : "2024-03-29 07:37", "content" : { "otype" : "JournalArticle", "mtid" : 22832326, "status" : "APPROVED", "published" : true, "comment" : "BE Bao, F", "unhandledTickets" : 0, "oldTimestamp" : "2018-09-14T08:19:42.000+0000", "deleted" : false, "oldId" : 12832326, "lastRefresh" : "2021-12-12T21:44:38.992+0000", "lastModified" : "2021-02-10T09:03:06.283+0000", "created" : "2013-01-15T15:52:14.000+0000", "creator" : { "otype" : "Admin", "mtid" : 10015168, "link" : "/api/admin/10015168", "label" : "Szakonyi Erzsebet (RAMKI admin 4)", "familyName" : "Szakonyi", "givenName" : "Erzsebet", "published" : true, "oldId" : 10015168, "snippet" : true }, "lastDuplumOK" : "2021-02-10T09:03:09.504+0000", "lastDuplumSearch" : "2021-02-10T09:03:09.504+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000059, "link" : "/api/subtype/10000059", "label" : "Szakcikk (Folyóiratcikk)", "name" : "Szakcikk", "nameEng" : "Article", "docType" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "listPosition" : 101, "published" : true, "oldId" : 10000059, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Tonien, D", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 21593027, "link" : "/api/authorship/21593027", "label" : "Tonien, D", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Tonien", "givenName" : "D", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049155, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 21593028, "link" : "/api/authorship/21593028", "label" : "Safavi-Naini, R", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Safavi-Naini", "givenName" : "R", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049154, "snippet" : true } ], "title" : "An efficient single-key pirates tracing scheme using cover-free families", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 5701067, "link" : "/api/publicationidentifier/5701067", "label" : "DOI: 10.1007/11767480_6", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "NO", "idValue" : "10.1007/11767480_6", "realUrl" : "https://doi.org/10.1007%2F11767480_6", "published" : false, "oldId" : 2844232, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 5701065, "link" : "/api/publicationidentifier/5701065", "label" : "WoS: 000238570400006", "source" : { "otype" : "PlainSource", "mtid" : 1, "link" : "/api/publicationsource/1", "label" : "WoS", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "WoS", "nameEng" : "WoS", "linkPattern" : "http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=CustomerName&SrcApp=CustomerName&DestLinkType=FullRecord&KeyUT=@@@&DestApp=WOS", "publiclyVisible" : true, "published" : true, "oldId" : 1, "snippet" : true }, "validState" : "NO", "idValue" : "000238570400006", "realUrl" : "http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=CustomerName&SrcApp=CustomerName&DestLinkType=FullRecord&KeyUT=000238570400006&DestApp=WOS", "published" : false, "oldId" : 9362319, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 5701066, "link" : "/api/publicationidentifier/5701066", "label" : "Scopus: 33746621594", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "NO", "idValue" : "33746621594", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-33746621594", "published" : false, "oldId" : 2844233, "snippet" : true } ], "journal" : { "otype" : "Journal", "mtid" : 3029, "link" : "/api/journal/3029", "label" : "LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349", "pIssn" : "0302-9743", "eIssn" : "1611-3349", "reviewType" : "REVIEWED", "noIF" : false, "sciIndexed" : true, "scopusIndexed" : true, "lang" : "FOREIGN", "hungarian" : false, "published" : true, "oldId" : 3029, "snippet" : true }, "volume" : "3989", "firstPage" : "82", "lastPage" : "97", "firstPageOrInternalIdForSort" : "82", "pageLength" : 16, "publishedYear" : 2006, "conference" : { "otype" : "Conference", "mtid" : 257443, "link" : "/api/conference/257443", "label" : "4th International Conference on Applied Cryptography and Network Security, ACNS 2006 2006-06-06 [Singapore, Szingapúr]", "location" : [ { "otype" : "City", "mtid" : 10493, "link" : "/api/city/10493", "label" : "Singapore, Szingapúr", "partOf" : { "otype" : "Country", "mtid" : 10074, "link" : "/api/country/10074", "label" : "Szingapúr", "published" : true, "oldId" : 2151549, "snippet" : true }, "published" : true, "oldId" : 1027370, "snippet" : true } ], "published" : true, "snippet" : true }, "digital" : null, "printed" : null, "sourceYear" : 2013, "packet" : "(Szakonyi Erzsebet (MATK admin); 2013.01.15. 16:50:48)", "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2021-12-12", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 2, "citedCount" : 2, "ratings" : [ { "otype" : "SjrRating", "mtid" : 5917702, "link" : "/api/sjrrating/5917702", "label" : "sjr:Q2 (2006) Scopus - Computer Science (miscellaneous) LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349", "listPos" : 45, "rankValue" : 0.49, "type" : "book series", "ratingType" : { "otype" : "RatingType", "mtid" : 10002, "link" : "/api/ratingtype/10002", "label" : "sjr", "code" : "sjr", "published" : true, "snippet" : true }, "subject" : { "otype" : "ClassificationExternal", "mtid" : 1701, "link" : "/api/classificationexternal/1701", "label" : "Scopus - Computer Science (miscellaneous)", "published" : true, "oldId" : 1701, "snippet" : true }, "ranking" : "Q2", "calculation" : "DIRECT", "published" : true, "oldId" : 5917702, "snippet" : true } ], "ratingsForSort" : "Q2", "mtaRatingsForSort" : "A", "references" : [ { "otype" : "Reference", "mtid" : 15677200, "link" : "/api/reference/15677200", "label" : "1. Berlekamp, E.R., Welch, L., (1986) Error Correction of Algebraic Block Codes, , U.S. Patent No. 4633470", "listPosition" : 1, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677201, "link" : "/api/reference/15677201", "label" : "2. Boneh, D., Franklin, M., An efficient public key traitor tracing scheme Proceedings of CRYPTO 1999, Lecture Notes in Computer Science, 1666, pp. 338-353", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677202, "link" : "/api/reference/15677202", "label" : "3. Chor, B., Fiat, A., Naor, M., Tracing traitors (1994) Proceedings of CRYPTO 1994, Lecture Notes in Computer Science, 839, pp. 257-270", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677203, "link" : "/api/reference/15677203", "label" : "4. Cramer, R., Shoup, V., A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack Proceedings of CRYPTO 1998, Lecture Notes in Computer Science, 1462, pp. 13-25", "listPosition" : 4, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677204, "link" : "/api/reference/15677204", "label" : "5. Dodis, Y., Fazio, N., Public key trace and revoke scheme secure against adaptive chosen ciphertext attack (2003) Proceedings of PKC 2003, Lecture Notes in Computer Science, 2567, pp. 100-115", "listPosition" : 5, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677205, "link" : "/api/reference/15677205", "label" : "6. D'yachkov, A.G., Macula, A.J., Rykov, V.V., New constructions of superimposed codes (2000) IEEE Transactions on Information Theory, 46, pp. 284-290", "listPosition" : 6, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677206, "link" : "/api/reference/15677206", "label" : "7. D'yachkov, A.G., Rykov, V.V., Bounds on the length of disjunctive codes (1982) Problemy Peredachi Informatsii, 18, pp. 7-13. , [Russian]", "listPosition" : 7, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677207, "link" : "/api/reference/15677207", "label" : "8. Füredi, Z., On r-cover-free families (1996) Journal of Combinatorial Theory A, 73, pp. 172-173", "listPosition" : 8, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677208, "link" : "/api/reference/15677208", "label" : "9. Kautz, W.H., Singleton, R.C., Nonrandom binary superimposed codes (1964) IEEE Transactions on Information Theory, 10, pp. 363-377", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677209, "link" : "/api/reference/15677209", "label" : "10. Kiayias, A., Yung, M., Self protecting pirates and black-box traitor tracing (2001) Proceedings of CRYPTO 2001, Lecture Notes in Computer Science, 2139, pp. 63-79", "listPosition" : 10, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677210, "link" : "/api/reference/15677210", "label" : "11. Kiayias, A., Yung, M., On crafty pirates and foxy tracers (2002) Proceedings of DRM 2001. Lecture Notes in Computer Science, 2320, pp. 22-39", "listPosition" : 11, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677211, "link" : "/api/reference/15677211", "label" : "12. Kiayias, A., Yung, M., Traitor tracing with constant transmission rate (2002) Proceedings of EUROCRYPT 2002, Lecture Notes in Computer Science, 2332, pp. 450-465", "listPosition" : 12, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677212, "link" : "/api/reference/15677212", "label" : "13. Kiayias, A., Yung, M., Breaking and repairing asymmetric public-key traitor tracing (2003) Proceedings of DRM 2002, Lecture Notes in Computer Science, 2696, pp. 32-50", "listPosition" : 13, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677213, "link" : "/api/reference/15677213", "label" : "14. Kim, C.H., Hwang, Y.H., Lee, P.J., An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack (2003) Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science, 2894, pp. 359-373", "listPosition" : 14, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677214, "link" : "/api/reference/15677214", "label" : "15. Kim, C.H., Hwang, Y.H., Lee, P.J., TTS without revocation capability secure against CCA2 (2004) Proceedings of AGIS P 2004, Lecture Notes in Computer Science, 3108, pp. 36-49", "listPosition" : 15, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677215, "link" : "/api/reference/15677215", "label" : "16. Kurosawa, K., Desmedt, Y., Optimum traitor tracing and asymmetric schemes with arbiter (1998) Proceedings of EUROCRYPT 1998, Lecture Notes in Computer Science, 1403, pp. 145-157", "listPosition" : 16, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677216, "link" : "/api/reference/15677216", "label" : "17. Kurosawa, K., Yoshida, T., Linear code implies public-key traitor tracing (2002) Proceedings of PKC 2002, Lecture Notes in Computer Science, 2274, pp. 172-187", "listPosition" : 17, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677217, "link" : "/api/reference/15677217", "label" : "18. Matsushita, T., Imai, H., A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates Proceedings of ASIACRYPT 2004, Lecture Notes in Computer Science, 3329, pp. 260-275", "listPosition" : 18, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677218, "link" : "/api/reference/15677218", "label" : "19. Naor, M., Pinkas, B., Threshold traitor tracing (1998) Proceedings of CRYPTO 1998, Lecture Notes in Computer Science, 1462, pp. 502-517", "listPosition" : 19, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677219, "link" : "/api/reference/15677219", "label" : "20. Naor, M., Pinkas, B., Efficient trace and revoke schemes (2001) Proceedings of Financial Cryptography 2000, Lecture Notes in Computer Science, 1962, pp. 1-20", "listPosition" : 20, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677220, "link" : "/api/reference/15677220", "label" : "21. Narayanan, A., Rangan, C.P., Kim, K., Practical pay TV schemes (2003) Proceedings of ACISP 2003, Lecture Notes in Computer Science, 2727, pp. 192-203", "listPosition" : 21, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677221, "link" : "/api/reference/15677221", "label" : "22. Paillier, P., Public-key cryptosystems based on discrete logarithms residues (1999) Proceedings of EUROCRYPT 1999, Lecture Notes in Computer Science, 1592, pp. 223-238", "listPosition" : 22, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677222, "link" : "/api/reference/15677222", "label" : "23. Ruszinkó, M., On the upper bound of the size of the r-cover-free families (1994) Journal of Combinatorial Theory A, 66, pp. 302-310", "listPosition" : 23, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677223, "link" : "/api/reference/15677223", "label" : "24. Safavi-Naini, R., Wang, H., Multireceiver authentication codes: Models, bounds, constructions, and extensions (1999) Information and Computation, 151, pp. 148-172", "listPosition" : 24, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677224, "link" : "/api/reference/15677224", "label" : "25. Stinson, D.R., Van Trung, T., Wei, R., Secure frameproof codes, key distribution patterns, group testing algorithms and related structures Journal of Statistical Planning and Inference", "listPosition" : 25, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677225, "link" : "/api/reference/15677225", "label" : "26. Stinson, D.R., Wei, R., Zhu, L., Some new bounds for cover-free families (2000) Journal of Combinatorial Theory A, 90, pp. 224-234", "listPosition" : 26, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677226, "link" : "/api/reference/15677226", "label" : "27. Tonien, D., On a Traitor Tracing Scheme from ACISP 2003, , Cryptology ePrint Archive 2005/371", "listPosition" : 27, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677227, "link" : "/api/reference/15677227", "label" : "28. Tonien, D., Safavi-Naini, R., An Efficient Single-key Pirates Tracing Scheme USing Cover-free Families, , Cryptology ePrint Archive 2006/099", "listPosition" : 28, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677228, "link" : "/api/reference/15677228", "label" : "29. Tzeng, W., Tzeng, Z., A public-key traitor tracing scheme with revocation using dynamic shares (2001) Proceedings of PKC 2001, Lecture Notes in Computer Science, 1992, pp. 207-224", "listPosition" : 29, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677229, "link" : "/api/reference/15677229", "label" : "30. Yan, J., Wu, Y., (2001) An Attack on Black-box Traitor Tracing Schemes, , Rump session, IEEE Symposium on Security and Privacy, Oakland, USA, May", "listPosition" : 30, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677230, "link" : "/api/reference/15677230", "label" : "31. Yan, J., Wu, Y., An Attack on a Traitor Tracing Scheme, , Cryptology ePrint Archive Report 2001/067", "listPosition" : 31, "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2017-12-31T23:00:00.000+0000", "publishDate" : "2013-01-23T23:00:10.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 2, "ownerInstituteCount" : 15, "directInstituteCount" : 0, "authorCount" : 2, "contributorCount" : 0, "hasQualityFactor" : false, "link" : "/api/publication/22832326", "label" : "Tonien D et al. An efficient single-key pirates tracing scheme using cover-free families. (2006) LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349 3989 82-97", "template" : "