{"id":"https://openalex.org/W2108663178","doi":"https://doi.org/10.1109/icdcs.2005.27","title":"Efficient Group Rekeying Using Application-Layer Multicast","display_name":"Efficient Group Rekeying Using Application-Layer Multicast","publication_year":2005,"publication_date":"2005-07-28","ids":{"openalex":"https://openalex.org/W2108663178","doi":"https://doi.org/10.1109/icdcs.2005.27","mag":"2108663178"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2005.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://www.cecs.uci.edu/%7Epapers/icdcs05/30_zhangx_rekeying.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046032643","display_name":"X.B. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"X.B. Zhang","raw_affiliation_strings":["Dept. of Comput. Sci., The Univ. of Texas at Austin, TX"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., The Univ. of Texas at Austin, TX","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101865930","display_name":"Simon S. Lam","orcid":"https://orcid.org/0000-0002-4447-6401"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S.S. Lam","raw_affiliation_strings":["Dept. of Comput. Sci., The Univ. of Texas at Austin, TX"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., The Univ. of Texas at Austin, TX","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048971651","display_name":"Huaiyu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"None Huaiyu Liu","raw_affiliation_strings":["Dept. of Comput. Sci., The Univ. of Texas at Austin, TX"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., The Univ. of Texas at Austin, TX","institution_ids":["https://openalex.org/I86519309"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.493,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":18,"citation_normalized_percentile":{"value":0.845756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"2627","issue":null,"first_page":"303","last_page":"313"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.69105405},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.425098}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.8605161},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84764266},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7912335},{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.69105405},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6228149},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.60847545},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.54592335},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4970682},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49470922},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4668425},{"id":"https://openalex.org/C174174714","wikidata":"https://www.wikidata.org/wiki/Q7310997","display_name":"Reliable multicast","level":4,"score":0.45699638},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.43494195},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.425098},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.35398784},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.16120565},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.096542686},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2005.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.700","pdf_url":"http://www.cecs.uci.edu/%7Epapers/icdcs05/30_zhangx_rekeying.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.700","pdf_url":"http://www.cecs.uci.edu/%7Epapers/icdcs05/30_zhangx_rekeying.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1485189405","https://openalex.org/W1502330892","https://openalex.org/W1513710402","https://openalex.org/W1569537154","https://openalex.org/W1650675509","https://openalex.org/W1668795879","https://openalex.org/W1978156735","https://openalex.org/W2000876023","https://openalex.org/W2007676189","https://openalex.org/W2031887679","https://openalex.org/W2032741749","https://openalex.org/W2042845290","https://openalex.org/W2057456423","https://openalex.org/W2062939617","https://openalex.org/W2064967060","https://openalex.org/W2071470557","https://openalex.org/W2083408498","https://openalex.org/W2097539178","https://openalex.org/W2097804243","https://openalex.org/W2108663178","https://openalex.org/W2110158792","https://openalex.org/W2118116239","https://openalex.org/W2123482462","https://openalex.org/W2123918207","https://openalex.org/W2129807746","https://openalex.org/W2133698456","https://openalex.org/W2135750114","https://openalex.org/W2143545186","https://openalex.org/W2153319198","https://openalex.org/W2166454918","https://openalex.org/W2167898414","https://openalex.org/W2168779480","https://openalex.org/W2169840105","https://openalex.org/W4211190976","https://openalex.org/W4240795668"],"related_works":["https://openalex.org/W3142539034","https://openalex.org/W2376449535","https://openalex.org/W2365793423","https://openalex.org/W2362616595","https://openalex.org/W2357012774","https://openalex.org/W2347920552","https://openalex.org/W2115913321","https://openalex.org/W2114210083","https://openalex.org/W1766239798","https://openalex.org/W1709705465"],"abstract_inverted_index":{"In":[0],"secure":[1],"group":[2,147],"communications,":[3],"there":[4],"are":[5],"both":[6],"rekey":[7,20,37,71,78,100,122],"and":[8,21,28,86,91,99],"data":[9,22,50],"traffic.":[10,51],"We":[11,67,89,104],"propose":[12,56,69],"to":[13,17,35,75,109,134],"use":[14],"application-layer":[15],"multicast":[16,58,97],"support":[18],"concurrent":[19],"transport.":[23],"Rekey":[24],"traffic":[25],"is":[26,33],"bursty":[27],"requires":[29],"fast":[30],"delivery.":[31],"It":[32],"desired":[34],"reduce":[36,77,121],"bandwidth":[38,48,79,123],"overhead":[39,80,124],"as":[40,42],"much":[41],"possible":[43],"since":[44],"it":[45],"competes":[46],"for":[47,95,139],"with":[49],"Towards":[52],"this":[53],"goal,":[54],"we":[55],"a":[57,70,146],"scheme":[59,74,98],"that":[60,117],"exploits":[61],"proximity":[62],"in":[63,132,145],"the":[64,96],"underlying":[65],"network.":[66],"further":[68],"message":[72,101],"splitting":[73,102],"significantly":[76],"at":[81],"each":[82],"user":[83],"access":[84],"link":[85],"network":[87],"link.":[88],"formulate":[90],"prove":[92],"correctness":[93],"properties":[94],"scheme.":[103],"have":[105],"conducted":[106],"extensive":[107],"simulations":[108],"evaluate":[110],"our":[111,118],"approach.":[112],"Our":[113],"simulation":[114],"results":[115],"show":[116],"approach":[119],"can":[120],"from":[125],"several":[126],"thousand":[127],"encrypted":[128],"new":[129],"keys":[130],"(encryptions,":[131],"short)":[133],"less":[135],"than":[136,141],"ten":[137],"encryptions":[138],"more":[140],"90%":[142],"of":[143,148],"users":[144],"1024":[149],"users.":[150]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2108663178","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2024-12-10T11:04:05.971941","created_date":"2016-06-24"}