{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:12:44Z","timestamp":1725466364668},"publisher-location":"New York","reference-count":15,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387239936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24043-8_12","type":"book-chapter","created":{"date-parts":[[2005,9,21]],"date-time":"2005-09-21T18:15:59Z","timestamp":1127326559000},"page":"111-122","source":"Crossref","is-referenced-by-count":0,"title":["Satellite IP Sec: An Optimized Way of Securing Multicast Wireless Communications"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Josset","sequence":"first","affiliation":[]},{"given":"Laurence","family":"Duquerroy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"http:\/\/brahms.tilab.com\/","key":"12_CR1"},{"unstructured":"M. Annoni, G. Boiero, N. Salis. Security issues in the BRAHMS system. Proceedings of the IST Mobile & Wireless Telecommunication Summit 2002","key":"12_CR2"},{"unstructured":"http:\/\/satip6.tilab.com\/","key":"12_CR3"},{"unstructured":"\u201cSecurity architecture for the Internet Protocol\u201d, RFC 2401, S. Kent, R. Atkinson, IETF, November 1998.","key":"12_CR4"},{"unstructured":"\u201cIP Encapsulating Security payload (ESP)\u201d, RFC 2406, S. Kent, R. Atkinson, IETF, November 1998","key":"12_CR5"},{"unstructured":"\u201cThe Internet Key Exchange (IKE)\u201d, RFC 2409, D. Harkins, D. Carrel, IETF, November 1998.","key":"12_CR6"},{"unstructured":"RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP)","key":"12_CR7"},{"doi-asserted-by":"crossref","unstructured":"C. K. Wong, M. Gouda, S.S. Lam. Secure group communications using keygraphs. ACM SIGCOMM 1998.","key":"12_CR8","DOI":"10.1145\/285237.285260"},{"doi-asserted-by":"crossref","unstructured":"D. M. Wallner, E.J. Harder, R. G. Agee. Key Management for multicast: Issues and architectures. Internet draft, Network working group, 1998.","key":"12_CR9","DOI":"10.17487\/rfc2627"},{"doi-asserted-by":"crossref","unstructured":"S. Mittra. Iolus: A framework for scalable secure multicasting. Proceedings of the ACM SIGCOMM'97. 1997.","key":"12_CR10","DOI":"10.1145\/263105.263179"},{"unstructured":"TESLA: Multicast Source Authentication Transform', draft-irtf-smug-tesla-OO.txt, IRTF, Nov 2000","key":"12_CR11"},{"unstructured":"C.K. Wong, S.S. Lam. Digital Signatures for flows and multicasts. IEEE\/ACM Transactions on Networking. 1999","key":"12_CR12"},{"unstructured":"P. Golle, N. Modagugu. Streamed authentication in the presence of random packet loss. to appear in NDSS 2001.","key":"12_CR13"},{"doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Canetti, J. Tygar, D. Song. Efficient authentication and signing of multicast streams over lossy channels. IEE Symposium on Security and Privacy, 2000.","key":"12_CR14","DOI":"10.1109\/SECPRI.2000.848446"},{"doi-asserted-by":"crossref","unstructured":"A. Pannetrat and R. Molva. Authenticating real time packet streams and multicasts. The Seventh IEEE Symposium on Computers and Communications. 2002.","key":"12_CR15","DOI":"10.1109\/ISCC.2002.1021720"}],"container-title":["IFIP International Federation for Information Processing","Broadband Satellite Comunication Systems and the Challenges of Mobility"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24043-8_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:58:00Z","timestamp":1605643080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24043-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387239936"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/0-387-24043-8_12","relation":{},"subject":[]}}