{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:52:22Z","timestamp":1725681142360},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/cis.2007.210","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:33Z","timestamp":1199462373000},"page":"863-867","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Flexible Digital Rights Management in a Pervasive Usage Mode"],"prefix":"10.1109","author":[{"given":"Ma","family":"Zhaofeng","sequence":"first","affiliation":[]},{"given":"Yang","family":"Yixian","sequence":"additional","affiliation":[]},{"given":"Niu","family":"Xinxin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Digital Rights Management Business and Technology","year":"2002","author":"rosenblatt","key":"ref10"},{"journal-title":"Digital Assent Management","year":"2004","author":"austerberry","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/0470855444"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1045\/april2001-erickson"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1045\/june2001-iannella"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/016555150202800504"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"IBM Electronic Media Management System (EMMS)","year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"journal-title":"Intertrust Rights System","year":"0","key":"ref8"},{"journal-title":"Microsoft DRM","year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"journal-title":"RealSystem Media Commerce Suite Technical White Paper","year":"0","key":"ref9"}],"event":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","start":{"date-parts":[[2007,12,15]]},"location":"Harbin, China","end":{"date-parts":[[2007,12,19]]}},"container-title":["2007 International Conference on Computational Intelligence and Security (CIS 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4415275\/4415276\/04415469.pdf?arnumber=4415469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T18:10:19Z","timestamp":1489687819000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4415469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cis.2007.210","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}