{"id":"https://openalex.org/W2151610459","doi":"https://doi.org/10.1504/ijact.2010.033796","title":"Defending against the pirate evolution attack","display_name":"Defending against the pirate evolution attack","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2151610459","doi":"https://doi.org/10.1504/ijact.2010.033796","mag":"2151610459"},"language":"en","primary_location":{"id":"doi:10.1504/ijact.2010.033796","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2010.033796","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Applied Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044205212","display_name":"Hongxia Jin","orcid":"https://orcid.org/0009-0000-0222-4217"},"institutions":[{"id":"https://openalex.org/I4210085935","display_name":"IBM Research - Almaden","ror":"https://ror.org/005w8dd04","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210085935","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongxia Jin","raw_affiliation_strings":["IBM Almaden Research Center, San Jose, CA 95120, USA"],"affiliations":[{"raw_affiliation_string":"IBM Almaden Research Center, San Jose, CA 95120, USA","institution_ids":["https://openalex.org/I4210085935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113999085","display_name":"Jeffrey Lotspiech","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeffrey Lotspiech","raw_affiliation_strings":["Lotspiech.com LLC, Henderson, NV, USA"],"affiliations":[{"raw_affiliation_string":"Lotspiech.com LLC, Henderson, NV, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019256883","display_name":"Serdar Pehlivano\u011flu","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Serdar Pehlivanoglu","raw_affiliation_strings":["Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044205212"],"corresponding_institution_ids":["https://openalex.org/I4210085935"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19971639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"1","first_page":"23","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8883495330810547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7490508556365967},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7372608780860901},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.678970456123352},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5804709196090698},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.5653479695320129},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5316107273101807},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43318188190460205},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4114696979522705},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.367573082447052},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09316787123680115},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.08072885870933533},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07216259837150574}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8883495330810547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7490508556365967},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7372608780860901},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.678970456123352},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5804709196090698},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.5653479695320129},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5316107273101807},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43318188190460205},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4114696979522705},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.367573082447052},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09316787123680115},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.08072885870933533},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07216259837150574},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijact.2010.033796","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2010.033796","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Applied Cryptography","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1481965140","https://openalex.org/W1500101059","https://openalex.org/W1526345135","https://openalex.org/W1596144702","https://openalex.org/W1905774212","https://openalex.org/W2165902826","https://openalex.org/W2168571148","https://openalex.org/W2295616646"],"related_works":["https://openalex.org/W2600062742","https://openalex.org/W2321709401","https://openalex.org/W2004104370","https://openalex.org/W2898075319","https://openalex.org/W3144137556","https://openalex.org/W2185488310","https://openalex.org/W3148042169","https://openalex.org/W2810680364","https://openalex.org/W2184014873","https://openalex.org/W2594804272"],"abstract_inverted_index":{"A":[0],"trace":[1],"and":[2,42,86,146],"revoke":[3],"scheme":[4,8,96],"is":[5,24,105],"an":[6,84],"encryption":[7],"to":[9,44,74,97,143],"make":[10],"sure":[11],"that":[12,33,69],"only":[13],"authorised":[14],"users":[15,32],"can":[16],"access":[17],"the":[18,26,30,36,45,55,90,109,121,137,141],"content.":[19],"When":[20],"a":[21,49,62,132],"clone":[22,46],"device":[23],"recovered,":[25],"'trace'":[27],"component":[28],"detects":[29],"pirate":[31,50,67,122],"have":[34],"compromised":[35,56],"secret":[37,57],"keys":[38,58],"in":[39,107],"their":[40],"devices":[41],"contributed":[43],"device.":[47],"In":[48,78],"evolution":[51,123,144],"attack,":[52],"attackers":[53],"release":[54],"very":[59],"slowly":[60],"through":[61],"number":[63],"of":[64,66],"generations":[65],"decoders":[68],"will":[70,82],"take":[71],"long":[72],"time":[73],"disable":[75],"them":[76],"all.":[77],"this":[79,101],"paper":[80],"we":[81],"show":[83],"easy":[85],"efficient":[87],"approach":[88],"for":[89,115],"state-of-art":[91],"subset":[92],"difference":[93],"based":[94],"trace-revoke":[95],"defend":[98],"well":[99],"against":[100],"attack.":[102],"Our":[103],"solution":[104],"deployed":[106],"AACS,":[108],"industry":[110],"new":[111],"content":[112],"protection":[113],"standard":[114],"high":[116],"definition":[117],"DVDs.":[118],"We":[119,134],"believe":[120],"tolerance":[124],"bound":[125],"should":[126],"be":[127],"considered":[128],"carefully":[129],"while":[130],"designing":[131],"scheme.":[133],"formally":[135],"analyse":[136],"trade":[138],"off":[139],"between":[140],"immunity":[142],"attack":[145],"revocation":[147],"efficiency.":[148]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
