{"id":"https://openalex.org/W2157043295","doi":"https://doi.org/10.1109/icme.2002.1035853","title":"k-time encryption for k-time licensing","display_name":"k-time encryption for k-time licensing","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2157043295","doi":"https://doi.org/10.1109/icme.2002.1035853","mag":"2157043295"},"language":"en","primary_location":{"id":"doi:10.1109/icme.2002.1035853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2002.1035853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041842232","display_name":"Gr\u00e1inne Perkins","orcid":null},"institutions":[{"id":"https://openalex.org/I4210095956","display_name":"Panasonic (United States)","ror":"https://ror.org/00pvgrv63","country_code":"US","type":"company","lineage":["https://openalex.org/I1283155146","https://openalex.org/I4210095956"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"G. Perkins","raw_affiliation_strings":["Panasonic Information and Networking Technologies Laboratory, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Panasonic Information and Networking Technologies Laboratory, Princeton, NJ, USA","institution_ids":["https://openalex.org/I4210095956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103194665","display_name":"Prasanta Bhattacharya","orcid":"https://orcid.org/0000-0002-6693-9032"},"institutions":[{"id":"https://openalex.org/I4210095956","display_name":"Panasonic (United States)","ror":"https://ror.org/00pvgrv63","country_code":"US","type":"company","lineage":["https://openalex.org/I1283155146","https://openalex.org/I4210095956"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Bhattacharya","raw_affiliation_strings":["Panasonic Information and Networking Technologies Laboratory, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Panasonic Information and Networking Technologies Laboratory, Princeton, NJ, USA","institution_ids":["https://openalex.org/I4210095956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041842232"],"corresponding_institution_ids":["https://openalex.org/I4210095956"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15883358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"601","last_page":"604"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7791829109191895},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.772861123085022},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6471941471099854},{"id":"https://openalex.org/keywords/license","display_name":"License","score":0.6092303991317749},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5839614272117615},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5703004598617554},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.47712230682373047},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4190729856491089},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12916985154151917},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11224246025085449},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07164344191551208}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7791829109191895},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.772861123085022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6471941471099854},{"id":"https://openalex.org/C2780560020","wikidata":"https://www.wikidata.org/wiki/Q79719","display_name":"License","level":2,"score":0.6092303991317749},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5839614272117615},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5703004598617554},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.47712230682373047},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4190729856491089},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12916985154151917},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11224246025085449},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07164344191551208},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme.2002.1035853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2002.1035853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Multimedia and Expo","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W25515858","https://openalex.org/W1483738616","https://openalex.org/W1515664404","https://openalex.org/W1543063283","https://openalex.org/W1543331277","https://openalex.org/W1580417272","https://openalex.org/W1599023405","https://openalex.org/W1985373990","https://openalex.org/W1998777945","https://openalex.org/W2001139415","https://openalex.org/W2012857639","https://openalex.org/W2030559168","https://openalex.org/W2066234652","https://openalex.org/W2148888468","https://openalex.org/W2168837868","https://openalex.org/W2209573931","https://openalex.org/W3131848094","https://openalex.org/W6601053492","https://openalex.org/W6634934108","https://openalex.org/W6667217422","https://openalex.org/W6671777941"],"related_works":["https://openalex.org/W2606446052","https://openalex.org/W2036021480","https://openalex.org/W3195777957","https://openalex.org/W2382668227","https://openalex.org/W2348482143","https://openalex.org/W2024584030","https://openalex.org/W3104168426","https://openalex.org/W1603675680","https://openalex.org/W2900561557","https://openalex.org/W1481328777"],"abstract_inverted_index":{"We":[0],"introduce":[1,99],"the":[2,32,36,57,77,81,90,100,107,117],"notion":[3],"of":[4,92,94,102,110],"a":[5,12,19,50,74],"k-time":[6,20,62],"license":[7,25],"for":[8,14],"digital":[9,44],"content":[10,45,58],"and":[11,55,113],"method":[13],"ensuring":[15],"its":[16],"security":[17,93,118],"via":[18],"encryption":[21,63],"scheme.":[22,64],"A":[23],"k-times":[24],"is":[26,46],"an":[27],"agreement":[28],"that":[29,53],"legally":[30],"allows":[31],"purchaser":[33],"to":[34,60],"use":[35,68],"licensed":[37],"material":[38],"at":[39],"most":[40],"k":[41],"times.":[42],"The":[43,65],"only":[47],"accessible":[48],"through":[49],"provided":[51],"application":[52,66,78],"decrypts":[54],"re-encrypts":[56],"according":[59],"our":[61,95],"must":[67],"secret":[69,104],"keys":[70,105],"during":[71],"this":[72],"process,":[73],"vulnerability":[75],"since":[76],"resides":[79],"on":[80],"user's":[82],"PC":[83],"or":[84],"electronic":[85],"device.":[86],"To":[87],"help":[88],"heighten":[89],"level":[91],"system,":[96],"we":[97],"also":[98],"idea":[101],"hiding":[103],"in":[106],"heuristic":[108],"solutions":[109],"NP-hard":[111],"problems":[112],"then":[114],"further":[115],"extend":[116],"with":[119],"some":[120],"other":[121],"well":[122],"known":[123],"methods.":[124]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
