{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:27:04Z","timestamp":1738387624886,"version":"3.35.0"},"reference-count":20,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2009,2,1]],"date-time":"2009-02-01T00:00:00Z","timestamp":1233446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1016\/j.cose.2008.08.002","type":"journal-article","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T11:19:02Z","timestamp":1219922342000},"page":"29-39","source":"Crossref","is-referenced-by-count":4,"title":["Huffman-based join-exit-tree scheme for contributory key management"],"prefix":"10.1016","volume":"28","author":[{"given":"Xiaozhuo","family":"Gu","sequence":"first","affiliation":[]},{"given":"Jianzu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Julong","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Zhenhuan","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.08.002_bib20","doi-asserted-by":"crossref","unstructured":"Agarwal DA, Chevassuty O, Thompson M.R, Tsudik G. \u201cAn Integrated Solution for Secure Group Communication in Wide-Area Networks\u201d. In: Proc of the 6th IEEE Symposium on Computers and Communications, July 2001, p. 22.","DOI":"10.1109\/ISCC.2001.935350"},{"key":"10.1016\/j.cose.2008.08.002_bib17","unstructured":"Alves-Foss J. An efficient secure authenticated group key exchange algorithm for large and dynamic groups. In: Proc. 23rd National Information Systems Security Conference, 2000, pp. 254\u2013266."},{"issue":"8","key":"10.1016\/j.cose.2008.08.002_bib4","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2002.803986","article-title":"Scalable secure group communication over IP multicast","volume":"20","author":"Banerjee","year":"2002","journal-title":"IEEE J Sel Areas Commun"},{"key":"10.1016\/j.cose.2008.08.002_bib9","doi-asserted-by":"crossref","unstructured":"Becker K, Wille U. \u201cCommunication complexity of group key distribution.\u201d In: Proc. 5th ACM Conf. Computer and Communications Security, 1998, pp. 1\u20136.","DOI":"10.1145\/288090.288094"},{"year":"1987","series-title":"Exploiting virtual synchrony in distributed systems","author":"Birman","key":"10.1016\/j.cose.2008.08.002_bib18"},{"key":"10.1016\/j.cose.2008.08.002_bib7","doi-asserted-by":"crossref","unstructured":"Burmester M, Desmedt Y. \u201cA secure and efficient conference key distribution system.\u201d In: Proc. EUROCRYPT, 1994, vol. 950, LNCS, pp. 275\u2013286.","DOI":"10.1007\/BFb0053443"},{"key":"10.1016\/j.cose.2008.08.002_bib3","doi-asserted-by":"crossref","unstructured":"Canetti R, Garay J, Itkis G, Micciancio D, Naor M, Pinkas B. \u201cMulticast security: a taxonomy and some efficient constructions.\u201d In: Proc. IEEE INFOCOM \u201999, vol. 2, March 1999, pp. 708\u2013716.","DOI":"10.1109\/INFCOM.1999.751457"},{"year":"1991","series-title":"Elements of information theory","author":"Cover","key":"10.1016\/j.cose.2008.08.002_bib19"},{"issue":"6","key":"10.1016\/j.cose.2008.08.002_bib10","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans Inform Theory"},{"key":"10.1016\/j.cose.2008.08.002_bib13","unstructured":"Dondeti LR, Mukherjee S. \u201cDISEC: A distributed framework for scalable secure many-to-many communication.\u201d In: Proc. 5th IEEE Symp. Computer and Communications Security, 2000, pp. 693\u2013698."},{"issue":"5","key":"10.1016\/j.cose.2008.08.002_bib6","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","article-title":"A conference key distribution system","volume":"28","author":"Ingemarsson","year":"1982","journal-title":"IEEE Trans Inf Theory"},{"key":"10.1016\/j.cose.2008.08.002_bib12","doi-asserted-by":"crossref","unstructured":"Kim Y, Perrig A, Tsudik G. \u201cSimple and fault-tolerance key agreement for dynamic collaborative groups.\u201d In: Proc. of 7th ACM conference on Computer and Communication security, 2000, pp. 235\u2013244.","DOI":"10.1145\/352600.352638"},{"key":"10.1016\/j.cose.2008.08.002_bib14","doi-asserted-by":"crossref","unstructured":"Kim Y, Perrig A, Tsudik G. \u201cCommunication-efficient group key agreement,\u201d Information Systems Security. Proceedings of the 17th International Information Security Conference IFIP SEC'01, Nov. 2001.","DOI":"10.1007\/0-306-46998-7_16"},{"issue":"5","key":"10.1016\/j.cose.2008.08.002_bib16","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TNET.2006.882851","article-title":"JET: dynamic join-exit-tree amortization and scheduling for contributory key management","volume":"14","author":"Mao","year":"2006","journal-title":"IEEE\/ACM Trans Networking"},{"year":"1998","series-title":"Key establishment in large dynamic groups using one-way function trees","author":"McGrew","key":"10.1016\/j.cose.2008.08.002_bib11"},{"key":"10.1016\/j.cose.2008.08.002_bib8","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M. \u201cDiffie-Hellman key distribution extended to group communication.\u201d In: Proc. 3rd ACM Conf. Computer and Communications Security, 1996, pp. 31\u201337.","DOI":"10.1145\/238168.238182"},{"issue":"2","key":"10.1016\/j.cose.2008.08.002_bib5","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TNET.2004.842236","article-title":"Resource-aware conference key establishment for heterogeneous networks","volume":"13","author":"Trappe","year":"2005","journal-title":"IEEE\/ACM Trans Networking"},{"key":"10.1016\/j.cose.2008.08.002_bib2","article-title":"Key management for multicast: issues and architectures","volume":"2627","author":"Wallner","year":"1999","journal-title":"RFC"},{"issue":"1","key":"10.1016\/j.cose.2008.08.002_bib1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","article-title":"Secure group communications using key graphs","volume":"8","author":"Wong","year":"2000","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"10.1016\/j.cose.2008.08.002_bib15","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.comnet.2006.03.008","article-title":"A communication\u2013computation efficient group key algorithm for large and dynamic groups","volume":"51","author":"Zheng","year":"2007","journal-title":"Comput Networks"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T18:24:53Z","timestamp":1738347893000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2]]},"references-count":20,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["S0167404808000680"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.08.002","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2009,2]]}}}