{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T15:07:04Z","timestamp":1716217624230},"reference-count":32,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1016\/j.pmcj.2006.07.001","type":"journal-article","created":{"date-parts":[[2006,9,7]],"date-time":"2006-09-07T18:43:24Z","timestamp":1157654604000},"page":"36-52","source":"Crossref","is-referenced-by-count":13,"title":["A three round authenticated group key agreement protocol for ad\u00a0hoc networks"],"prefix":"10.1016","volume":"3","author":[{"given":"Daniel","family":"Augot","sequence":"first","affiliation":[]},{"given":"Raghav","family":"Bhaskar","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Sacchetti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"17","key":"10.1016\/j.pmcj.2006.07.001_b1","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","article-title":"Key agreement in ad hoc networks","volume":"23","author":"Asokan","year":"2000","journal-title":"Computer Communication Review"},{"issue":"4","key":"10.1016\/j.pmcj.2006.07.001_b2","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/49.839937","article-title":"New multiparty authentication services and key agreement protocols","volume":"18","author":"Ateniese","year":"2000","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"10.1016\/j.pmcj.2006.07.001_b3","series-title":"IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing","article-title":"An efficient group key agreement protocol for ad hoc networks","author":"Augot","year":"2005"},{"key":"10.1016\/j.pmcj.2006.07.001_b4","series-title":"CCS\u201998: Proceedings of the 5th ACM Conference on Computer and Communications Security","first-page":"1","article-title":"Communication complexity of group key distribution","author":"Becker","year":"1998"},{"key":"10.1016\/j.pmcj.2006.07.001_b5","doi-asserted-by":"crossref","unstructured":"M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Advances in Cryptology, EUROCRYPT\u201900, in: LNCS, vol. 1807, 2000, pp. 139\u2013155","DOI":"10.1007\/3-540-45539-6_11"},{"key":"10.1016\/j.pmcj.2006.07.001_b6","series-title":"CCS\u201993: Proceedings of the 1st ACM Conference on Computer and Communications Security","first-page":"62","article-title":"Random oracles are practical: A paradigm for designing efficient protocols","author":"Bellare","year":"1993"},{"key":"10.1016\/j.pmcj.2006.07.001_b7","doi-asserted-by":"crossref","unstructured":"D. Boneh, The decision Diffie\u2013Hellman problem, in: ANTS-III: 3rd Algorithmic Number Theory Symposium, ANTS-III, in: LNCS, vol. 1423, 1998, pp. 48\u201363","DOI":"10.1007\/BFb0054851"},{"key":"10.1016\/j.pmcj.2006.07.001_b8","series-title":"2nd International Symposium on Network Computing and Applications","first-page":"156","article-title":"AdHocFS: Sharing files in WLANs","author":"Boulkenafed","year":"2003"},{"key":"10.1016\/j.pmcj.2006.07.001_b9","series-title":"Protocols for Authentication and Key Establishment","author":"Boyd","year":"2003"},{"key":"10.1016\/j.pmcj.2006.07.001_b10","doi-asserted-by":"crossref","unstructured":"C. Boyd, J.M.G. Nieto, Round-optimal contributory conference key agreement, in: Public Key Cryptography\u201903, in: LNCS, vol. 2567, 2003, pp. 161\u2013174","DOI":"10.1007\/3-540-36288-6_12"},{"key":"10.1016\/j.pmcj.2006.07.001_b11","series-title":"Proceedings of Public Key Cryptography","first-page":"115","article-title":"Constant round authenticated group key agreement via distributed computation","volume":"vol. 2567","author":"Bresson","year":"2004"},{"key":"10.1016\/j.pmcj.2006.07.001_b12","doi-asserted-by":"crossref","unstructured":"E. Bresson, O. Chevassut, D. Pointcheval, Provably authenticated group Diffie\u2013Hellman key exchange - the dynamic case, in: Advances in Cryptology, ASIACRYPT\u201901, in: LNCS, vol. 2248, 2001, pp. 290\u2013309","DOI":"10.1007\/3-540-45682-1_18"},{"key":"10.1016\/j.pmcj.2006.07.001_b13","series-title":"Advances in Cryptology, EUROCRYPT\u201902","first-page":"321","article-title":"Dynamic group Diffie Hellman key exchange under standard assumptions","volume":"vol. 2332","author":"Bresson","year":"2002"},{"key":"10.1016\/j.pmcj.2006.07.001_b14","series-title":"CCS\u201901: Proceedings of the 8th ACM Conference on Computer and Communications Security","first-page":"255","article-title":"Provably authenticated group Diffie-Hellman key exchange","author":"Bresson","year":"2001"},{"key":"10.1016\/j.pmcj.2006.07.001_b15","series-title":"Advances in Cryptology","first-page":"275","article-title":"A secure and efficient conference key distribution system","volume":"vol. 950","author":"Burmester","year":"1994"},{"key":"10.1016\/j.pmcj.2006.07.001_b16","unstructured":"Smart Dust. http:\/\/robotics.eecs.berkeley.edu\/~pister\/smartdust"},{"key":"10.1016\/j.pmcj.2006.07.001_b17","doi-asserted-by":"crossref","unstructured":"R. Dutta, R. Barua, Dynamic group key agreement in tree-based setting, in: ACISP, 2005, pp. 101\u2013112","DOI":"10.1007\/11506157_9"},{"issue":"2","key":"10.1016\/j.pmcj.2006.07.001_b18","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","article-title":"A digital signature scheme secure against adaptive chosen-message attacks","volume":"17","author":"Goldwasser","year":"1988","journal-title":"SIAM Journal of Computing"},{"key":"10.1016\/j.pmcj.2006.07.001_b19","doi-asserted-by":"crossref","unstructured":"M. Just, S. Vaudenay, Authenticated multi-party key agreement, in: Advances in Cryptology, ASIACRYPT\u201996, in: LNCS, vol. 1163, 1996, pp. 36\u201349","DOI":"10.1007\/BFb0034833"},{"key":"10.1016\/j.pmcj.2006.07.001_b20","author":"Katz"},{"key":"10.1016\/j.pmcj.2006.07.001_b21","series-title":"Advances in Cryptology","first-page":"110","article-title":"Scalable protocols for authenticated group key exchange \u2014 full version","volume":"vol. 2729","author":"Katz","year":"2003"},{"key":"10.1016\/j.pmcj.2006.07.001_b22","series-title":"CCS\u201900: Proceedings of the 7th ACM Conference on Computer and Communications Security","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"Kim","year":"2000"},{"issue":"7","key":"10.1016\/j.pmcj.2006.07.001_b23","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TC.2004.31","article-title":"Group key agreement efficient in communication","volume":"53","author":"Kim","year":"2004","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/j.pmcj.2006.07.001_b24","author":"GNU Multi Precision Arithmetic Library"},{"key":"10.1016\/j.pmcj.2006.07.001_b25","series-title":"Proceedings of Dial M Workshop","first-page":"96","article-title":"Leader election algorithms for mobile ad hoc networks","author":"Malpani","year":"2000"},{"key":"10.1016\/j.pmcj.2006.07.001_b26","series-title":"HandBook of Applied Cryptography","author":"Menezes","year":"1996"},{"key":"10.1016\/j.pmcj.2006.07.001_b27","author":"Nam"},{"key":"10.1016\/j.pmcj.2006.07.001_b28","series-title":"Proceedings of Workshop on Coding, Cryptography and Combinatorics","first-page":"277","article-title":"The key control in multi-party key agreement protocols","author":"Pieprzyk","year":"2004"},{"key":"10.1016\/j.pmcj.2006.07.001_b29","series-title":"ICSE\u201901: Proceedings of the 23rd International Conference on Software Engineering","first-page":"381","article-title":"Consistent group membership in ad hoc networks","author":"Roman","year":"2001"},{"issue":"3","key":"10.1016\/j.pmcj.2006.07.001_b30","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1137\/S0097539794276865","article-title":"Leader election in complete networks","volume":"26","author":"Singh","year":"1997","journal-title":"SIAM Journal of Computing"},{"key":"10.1016\/j.pmcj.2006.07.001_b31","series-title":"ACM Conference on Computer and Communications Security","first-page":"31","article-title":"Diffie-Hellman key distribution extended to groups","author":"Steiner","year":"1996"},{"issue":"8","key":"10.1016\/j.pmcj.2006.07.001_b32","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/71.877936","article-title":"Key agreement in dynamic peer groups","volume":"11","author":"Steiner","year":"2000","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119206000307?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119206000307?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T02:31:40Z","timestamp":1555813900000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119206000307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["S1574119206000307"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2006.07.001","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}