{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:47:54Z","timestamp":1740894474980,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200512"},{"type":"electronic","value":"9783540394051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39405-1_11","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T20:03:04Z","timestamp":1294516984000},"page":"119-130","source":"Crossref","is-referenced-by-count":6,"title":["Key Bundles and Parcels: Secure Communication in Many Groups"],"prefix":"10.1007","author":[{"given":"Eunjin","family":"Jung","sequence":"first","affiliation":[]},{"given":"Xiang-Yang Alex","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mohamed G.","family":"Gouda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/49.564150","volume":"15","author":"L. Gong","year":"1997","unstructured":"Gong, L.: Enclaves: Enabling secure collaboration over the internet. IEEE Journal of Selected Areas in Communications\u00a015, 567\u2013575 (1997)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"11_CR2","first-page":"277","volume-title":"The Proceedings of the ACM SIGCOMM 1997","author":"S. Mittra","year":"1997","unstructured":"Mittra, S.: Iolus: a framework for scalable secure multicasting. In: The Proceedings of the ACM SIGCOMM 1997, pp. 277\u2013288. ACM Press, New York (1997)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC 2627 (1999)","DOI":"10.17487\/rfc2627"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking (TON)\u00a08, 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems\u00a011, 769\u2013780 (2000)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"11_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/BF01200847","volume":"1","author":"L. Gong","year":"1995","unstructured":"Gong, L., Shacham, N.: Multicast security and its extension to a mobile environment. Wireless Networks 1, 281\u2013295 (1995)","journal-title":"Wireless Networks"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Ballardie, A.: Scalable multicast key distribution. RFC 1949 (1996)","DOI":"10.17487\/rfc1949"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Chang, I., Engel, R., Kandlur, D.D., Pendarakis, D.E., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: The Proceedings of IEEE Infocom 1999, vol.\u00a02, pp. 689\u2013698 (1999)","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/501978.501982","volume":"4","author":"O. Rodeh","year":"2001","unstructured":"Rodeh, O., Birman, K., Dolev, D.: The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. ACM Transactions on Information and System Security (TISSEC)\u00a04, 289\u2013319 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A scalable group re-keying approach for secure multicast. In: The Proceedings of IEEE Symposium on Security and Privacy (2000)","DOI":"10.1109\/SECPRI.2000.848459"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M. Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The versakey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications\u00a017, 1614\u20131631 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Gouda, M.G., Huang, C.T., Elnozahy, E.: Key trees and the security of the interval multicast. In: The Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 467\u2013468 (2002)","DOI":"10.1109\/ICDCS.2002.1022293"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1145\/371920.372153","volume-title":"The Proceedings of the 10th international World Wide Web conference on World Wide Web","author":"X.S. Li","year":"2001","unstructured":"Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch rekeying for secure group communications. In: The Proceedings of the 10th international World Wide Web conference on World Wide Web, pp. 525\u2013534. ACM Press, New York (2001)"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/383059.383062","volume-title":"The Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications","author":"Y.R. Yang","year":"2001","unstructured":"Yang, Y.R., Li, X.S., Zhang, X.B., Lam, S.S.: Reliable group rekeying: a performance analysis. In: The Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, pp. 27\u201338. ACM Press, New York (2001)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Snoeyink, J., Suri, S., Varghese, G.: A lower bound for multicast key distribution. In: The Proceedings of IEEE Infocom 2001, pp. 667\u2013675 (2001)","DOI":"10.1109\/INFCOM.2001.916725"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Jung, E., Liu, X.Y.A., Gouda, M.G.: Key bundles and parcels: Secure communication in many groups. Technical Report TR-03-21, Dept. of Computer Sciences, The University of Texas at Austin (2003)","DOI":"10.1007\/978-3-540-39405-1_11"}],"container-title":["Lecture Notes in Computer Science","Group Communications and Charges. Technology and Business Models"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39405-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T15:11:35Z","timestamp":1740841895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39405-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200512","9783540394051"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39405-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}