{"id":"https://openalex.org/W4211190976","doi":"https://doi.org/10.1109/infcom.2001.916725","title":"A lower bound for multicast key distribution","display_name":"A lower bound for multicast key distribution","publication_year":2002,"publication_date":"2002-11-13","ids":{"openalex":"https://openalex.org/W4211190976","doi":"https://doi.org/10.1109/infcom.2001.916725"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2001.916725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"http://www.cs.ucsd.edu/~varghese/PAPERS/compnetworks2005.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074061303","display_name":"Jack Snoeyink","orcid":"https://orcid.org/0000-0002-3887-4008"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Snoeyink","raw_affiliation_strings":["UNC Chapel Hill, Washington University of Saint Louis, USA"],"affiliations":[{"raw_affiliation_string":"UNC Chapel Hill, Washington University of Saint Louis, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072397842","display_name":"Subhash Suri","orcid":"https://orcid.org/0000-0002-5668-7521"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Suri","raw_affiliation_strings":["UC Santa Barbara, Washington University of Saint Louis, USA"],"affiliations":[{"raw_affiliation_string":"UC Santa Barbara, Washington University of Saint Louis, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102730096","display_name":"George Varghese","orcid":"https://orcid.org/0000-0002-8218-5701"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]},{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"G. Varghese","raw_affiliation_strings":["UC San Diego, Washington University of Saint Louis, USA"],"affiliations":[{"raw_affiliation_string":"UC San Diego, Washington University of Saint Louis, USA","institution_ids":["https://openalex.org/I204465549","https://openalex.org/I36258959"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.236,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":60,"citation_normalized_percentile":{"value":0.942836,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"422","last_page":"431"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9961,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.47464213}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.84306264},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.69923294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.61599576},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6148381},{"id":"https://openalex.org/C2778692605","wikidata":"https://www.wikidata.org/wiki/Q4041866","display_name":"Joins","level":2,"score":0.5761759},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.56556916},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.47464213},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47267586},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4611701},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.457398},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45675287},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.4138859},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39947736},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37917992},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28325427},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.28280568},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24168861},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.18576276},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09838724},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08523551},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2001.916725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.4543","pdf_url":"http://www.cs.ucsd.edu/~varghese/PAPERS/compnetworks2005.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.4543","pdf_url":"http://www.cs.ucsd.edu/~varghese/PAPERS/compnetworks2005.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.59,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1512594211","https://openalex.org/W1571147132","https://openalex.org/W1600192790","https://openalex.org/W1888517140","https://openalex.org/W1976714853","https://openalex.org/W1985912282","https://openalex.org/W2037515303","https://openalex.org/W2064967060","https://openalex.org/W2123918207","https://openalex.org/W2143545186","https://openalex.org/W2169383992"],"related_works":["https://openalex.org/W2659348321","https://openalex.org/W2583370794","https://openalex.org/W2392241939","https://openalex.org/W2390304198","https://openalex.org/W2382754013","https://openalex.org/W2379693083","https://openalex.org/W2373348596","https://openalex.org/W2370065598","https://openalex.org/W1991715159","https://openalex.org/W1977745377"],"abstract_inverted_index":{"With":[0],"the":[1,8,15,25,42],"rapidly":[2],"growing":[3],"importance":[4],"of":[5,56,85,105],"multicast":[6],"in":[7],"Internet":[9],"there":[10,81],"have":[11],"been":[12],"a":[13,31,53,83,102,114],"proposal,":[14],"RFC":[16],"2627,":[17],"for":[18,52,75,78,109,112],"scalable":[19],"key":[20,57,68,98],"distribution":[21,58,69,99],"such":[22],"that":[23,46],"when":[24],"nth":[26],"user":[27,65],"joins":[28],"or":[29,111],"leaves":[30],"group,":[32],"broadcasting":[33],"/spl":[34,94,106],"Theta/(logn)":[35],"encrypted":[36],"messages":[37],"is":[38,49,82,93],"sufficient":[39],"to":[40],"redistribute":[41],"keys.":[43],"We":[44],"show":[45],"this":[47],"bound":[48],"also":[50],"necessary":[51],"general":[54],"class":[55],"schemes":[59,70],"and":[60,88],"under":[61],"different":[62],"assumptions":[63],"on":[64],"capabilities.":[66],"While":[67],"can":[71],"trade":[72],"addition":[73],"cost":[74,92,104],"deletion":[76],"cost,":[77],"any":[79,97],"scheme":[80,100],"sequence":[84],"2n":[86],"insertion":[87],"deletions":[89],"whose":[90],"total":[91],"Omega/(nlogn).":[95],"Thus,":[96],"has":[101],"worst-case":[103],"Omega/(logn)":[107],"either":[108],"adding":[110],"deleting":[113],"user.":[115]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4211190976","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-01-08T23:13:08.460459","created_date":"2022-02-13"}