{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:17:40Z","timestamp":1725574660327},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200512"},{"type":"electronic","value":"9783540394051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39405-1_10","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T15:03:04Z","timestamp":1294498984000},"page":"107-118","source":"Crossref","is-referenced-by-count":8,"title":["Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast"],"prefix":"10.1007","author":[{"given":"Sencun","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Sanjeev","family":"Setia","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (August 2000) (work in progress)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-46703-8_19","volume-title":"Networked Group Communication","author":"B. Briscoe","year":"1999","unstructured":"Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol.\u00a01736, pp. 301\u2013320. Springer, Heidelberg (1999)"},{"key":"10_CR3","unstructured":"Chen, W., Dondeti, L.: Performance comparison of stateful and stateless group rekeying algorithms. In: Proc. of Fourth International Workshop on Networked Group Communication, NGC 2002 (2002)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S.: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2000)","DOI":"10.1109\/SECPRI.2000.848459"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self- Healing Key Distribution with Revocation. In: Proc. of the IEEE Symposium on Security and Privacy, oakland, CA (May 2002)","DOI":"10.1109\/SECPRI.2002.1004375"},{"issue":"1\/4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0166-5316(02)00130-X","volume":"49","author":"S. Setia","year":"2002","unstructured":"Setia, S., Zhu, S., Jajodia, S.: A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. Performance Evaluation\u00a049(1\/4), 21\u201341 (2002); special issue Proceedings of Performance 2002, Rome, Italy (September 2002)","journal-title":"Performance Evaluation"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Wong, C., Gouda, M., Lam, S.: Secure Group Communication Using Key Graphs. In: Proc. of SIGCOMM 1998, Vancouver, British Columbia, pp. 68\u201379 (1998)","DOI":"10.1145\/285237.285260"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. Internet Draft, draft-wallner-key-arch-01.txt (September 1998)","DOI":"10.17487\/rfc2627"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Y., Li, X., Zhang, X., Lam, S.: Reliable group rekeying: Design and Performance Analysis. In: Proc. of ACM SIGCOMM 2001, San Diego, CA, USA, pp. 27\u201338 (August 2001)","DOI":"10.1145\/383059.383062"},{"key":"10_CR11","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes. In: Proc. of the 23rd IEEE ICDCS 2003, Providence, RI (May 2003)"}],"container-title":["Lecture Notes in Computer Science","Group Communications and Charges. Technology and Business Models"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39405-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T14:23:12Z","timestamp":1559917392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39405-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200512","9783540394051"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39405-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}