{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:28Z","timestamp":1725562588025},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209546"},{"type":"electronic","value":"9783540246435"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24643-5_23","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T14:56:20Z","timestamp":1280760980000},"page":"260-271","source":"Crossref","is-referenced-by-count":3,"title":["A Scalable and Adaptive Key Management Protocol for Group Communication"],"prefix":"10.1007","author":[{"given":"Yacine","family":"Challall","sequence":"first","affiliation":[]},{"given":"Hatem","family":"Bettahar","sequence":"additional","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Almeroth, K., Ammar, M.: Collecting and modelling the join\/leave behaviour of multicast group members in the Mbone. In: Symposium on High Performance Distributed Computing (1996)","DOI":"10.1109\/HPDC.1996.546190"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Almeroth, K., Ammar, M.: Multicast group behaviour in the internet\u2019s multicast backbone (Mbone). IEEE communications Magazine (1997)","DOI":"10.1109\/35.587716"},{"key":"23_CR3","unstructured":"Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups : One-Way Function Trees and Amortized Initialization. draftbalensongroupkeymgmt- oft-00.txt (February 1999) Internet-Draft"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Chaddoud, G., Chrisment, I., Sha, A.: Dynamic Group Communication Security. In: 6th IEEE Symposium on computers and communication (2001)","DOI":"10.1109\/ISCC.2001.935354"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: Analytic Model and Theoritical Constructions (April 2003) Technical Report","DOI":"10.1145\/997150.997157"},{"key":"23_CR6","unstructured":"Dai, W.: Comparison of popular cryptographic algorithms (2000), http:\/\/www.eskimo.com\/~weidai\/benchmarks.html"},{"key":"23_CR7","unstructured":"Dondeti, L.R., Mukherjee, S., Samal, A.: Comparison of Hierarchical Key Distribution Schemes. In: IEEE Globcom Global Internet Symposium (1999)"},{"key":"23_CR8","unstructured":"Dondeti, L.R., Mukherjee, S., Samal, A.: Survey and Comparison of Secure Group Communication Protocols (1999) Technical Report"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Dondeti, L.R., Mukherjee, S., Samal, A.: Scalable secure one to-many group communication using dual encryption. Computer Communications (2000)","DOI":"10.1016\/S0140-3664(00)00255-3"},{"key":"23_CR10","unstructured":"Gondran, M., Minoux, M.: Graphs and Algorithms. Wiley-interscience series in discret mathematics edition (1990)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture (July 1997) RFC 2093","DOI":"10.17487\/rfc2094"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification (July 1997) RFC (2094)","DOI":"10.17487\/rfc2093"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus : A Framework for Scalable Secure Multicasting. ACM SIGCOMM (1997)","DOI":"10.1145\/263105.263179"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Oppliger, R., Albanese, A.: Distributed registration and key distribution (DiRK). In: Proceedings of the 12th International Conference on Information Security IFIP SEC 1996 (1996)","DOI":"10.1007\/978-1-5041-2919-0_17"},{"key":"23_CR15","unstructured":"Federal Information Processing Standards Publication. Data Encryption Standard (DES) (December 1993) FIPS PUB 46"},{"key":"23_CR16","unstructured":"Federal Information Processing Standards Publication. Advanced Encryption Standard (AES) (November 2001) FIPS PUB 197"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Shiels, C., Garcia-Luna-Aceves, J.J.: KHIP-A scalable protocol for secure multicast routing. ACM SIGCOMM (1999)","DOI":"10.1145\/316188.316206"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Snoeyink, J., Suri, S., Vorghese, G.: A Lower Bound for Multicast Key Distribution. In: IEEE INFOCOM 2001 (2001)","DOI":"10.1109\/INFCOM.2001.916725"},{"issue":"8","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M. Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework : Versatile Group Key Management. IEEE Journal on Selected Areas in Communications (special Issues on Middleware)\u00a017(8), 1614\u20131631 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications (special Issues on Middleware)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999) RFC 2627","DOI":"10.17487\/rfc2627"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. ACM SIGCOMM (1998)","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24643-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:15:29Z","timestamp":1559358929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24643-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209546","9783540246435"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24643-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}