{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:13Z","timestamp":1725475813212},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_15","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"178-190","source":"Crossref","is-referenced-by-count":3,"title":["Key Management for Secure Multicast with Dynamic Controller"],"prefix":"10.1007","author":[{"given":"Hartono","family":"Kurnio","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/3-540-46416-6_50","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"S. Berkovits","year":"1991","unstructured":"Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 535\u2013541. Springer, Heidelberg (1991)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999, 708\u2013716 (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Malkin, T., Nissim, K.: Efficient Communication-Storage Tradeoffs forMulticast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 459\u2013474. Springer, Heidelberg (1999)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key Management for Secure Internet Multicast Using Boolean Function Minimisation Techniques. In: INFOCOM 1999, pp. 689\u2013698 (1999)","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Inform. Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/BF00191355","volume":"8","author":"M. Dyer","year":"1995","unstructured":"Dyer, M., Fenner, T., Frieze, A., Thomason, A.: On Key Storage in Secure Networks. Journal of Cryptology\u00a08, 189\u2013200 (1995)","journal-title":"Journal of Cryptology"},{"key":"15_CR7","unstructured":"McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees (1998) (Manuscript)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L. Gong","year":"1990","unstructured":"Gong, L., Wheeler, D.J.: A Matrix Key-Distribution Scheme. Journal of Cryptology\u00a02, 51\u201359 (1990)","journal-title":"Journal of Cryptology"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"R. Kumar","year":"1999","unstructured":"Kumar, R., Rajagopalan, S., Sahai, A.: Coding Constructions for Blacklisting Problems Without Computational Assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 609\u2013623. Springer, Heidelberg (1999)"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C.J. Mitchell","year":"1988","unstructured":"Mitchell, C.J., Piper, F.C.: Key Storage in Secure Networks. Discrete Applied Mathematics\u00a021, 215\u2013228 (1988)","journal-title":"Discrete Applied Mathematics"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/BF01388388","volume":"5","author":"C.M. O\u2019Keefe","year":"1995","unstructured":"O\u2019Keefe, C.M.: Key Distribution Patterns Using Minkowski Planes. Designs, Codes and Cryptography\u00a05, 261\u2013267 (1995)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/BF01578871","volume":"4","author":"K.A.S. Quinn","year":"1994","unstructured":"Quinn, K.A.S.: Some Constructions for Key Distribution Patterns. Designs, Codes and Cryptography\u00a04, 177\u2013191 (1994)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR14","volume-title":"A Practical Introduction to Data Structures and Algorithm Analysis","author":"C.A. Shaffer","year":"1997","unstructured":"Shaffer, C.A.: A Practical Introduction to Data Structures and Algorithm Analysis. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1023\/A:1008268610932","volume":"12","author":"D.R. Stinson","year":"1997","unstructured":"Stinson, D.R.: On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption. Designs, Codes and Cryptography\u00a012, 215\u2013243 (1997)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR16","unstructured":"Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. Internet Draft (draft-wallner-key-arch-01.txt), ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-wallner-key-arch-01.txt"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graphs. In: Proceedings of SIGCOMM 1998, pp. 68\u201379 (1998)","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T07:09:56Z","timestamp":1683702596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/10718964_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}