{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:37Z","timestamp":1725475837305},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673804"},{"type":"electronic","value":"9783540455684"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_10","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T15:38:40Z","timestamp":1167493120000},"page":"120-131","source":"Crossref","is-referenced-by-count":0,"title":["Why Hierarchical Key Distribution Is Appropriate for Multicast Networks"],"prefix":"10.1007","author":[{"given":"Chandana","family":"Gamage","sequence":"first","affiliation":[]},{"given":"Jussipekka","family":"Leiwo","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ballardie, A.: Scalable multicast key distribution. RFC 1949, Network Working Group (May 1996)","key":"10_CR1","DOI":"10.17487\/rfc1949"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/NDSS.1995.390649","volume-title":"Proceedings of the Internet Society Symposium on Network and Distributed System Security (NDSS 1995)","author":"A. Ballardie","year":"1995","unstructured":"Ballardie, A., Crowcroft, J.: Multicast-specific security threats and counter- measures. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security (NDSS 1995), San Diego, CA, February 1995, pp. 2\u201316. IEEE Computer Society Press, Los Alamitos (1995)"},{"doi-asserted-by":"crossref","unstructured":"Ballardie, A., Francis, P., Crowcroft, J.: Core based trees (CBT): An architecture for scalable inter-domain routing. SIGCOMM Computer Communication Review 23(4), 85\u201395 (1993);","key":"#cr-split#-10_CR3.1","DOI":"10.1145\/167954.166246"},{"unstructured":"Conference Proceedings of the Communication Architectures, Protocols and Applications Conference","key":"#cr-split#-10_CR3.2"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and efficient constructions. In: Proceedings of IEEE INFOCOM 1999, New York (March 1999)","key":"10_CR4","DOI":"10.1109\/INFCOM.1999.751457"},{"unstructured":"Chuang, J.C.-I., Sirbu, M.A.: Pricing multicast communication: A cost-based approach. In: Proceedings of the 8th Annual Internet Society Conference (INET 1998), Geneva, Switzerland (July 1998) ISOC","key":"10_CR5"},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/78952.78953","volume":"8","author":"S.E. Deering","year":"1990","unstructured":"Deering, S.E., Cheriton, D.R.: Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems\u00a08(2), 85\u2013110 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"Deering, S.E., Estrin, D., Farinacci, D., Jacobson, V., Liu, C.-G., Wei, L.: An architecture for wide-area multicast routing. SIGCOMM Computer Communication Review 24(4), 126\u2013135 (1994);","key":"#cr-split#-10_CR7.1","DOI":"10.1145\/190809.190326"},{"unstructured":"Conference Proceedings of the Communication Architectures, Protocols and Applications Conference","key":"#cr-split#-10_CR7.2"},{"unstructured":"Gong, L.: Enclaves: Enabling secure collaboration over the Internet. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, July 1996, pp. 149\u2013159 (1996) USENIX","key":"10_CR8"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/BF01200847","volume":"1","author":"L. Gong","year":"1995","unstructured":"Gong, L., Shacham, N.: Multicast security and its extension to a mobile environment. ACM-Baltzer Journal of Wireless Networks\u00a01(3), 281\u2013295 (1995)","journal-title":"ACM-Baltzer Journal of Wireless Networks"},{"doi-asserted-by":"crossref","unstructured":"Gong, L., Shacham, N.: Trade-offs in routing private multicast traffic. In: Proceedings of IEEE GLOBECOM 1995, Singapore (November 1995)","key":"10_CR10","DOI":"10.1109\/GLOCOM.1995.502779"},{"unstructured":"Harney, H., Muckenhirn, C., Rivers, T.: Group key management protocol (GKMP) architecture. Internet Draft (1994)","key":"10_CR11"},{"key":"10_CR12","first-page":"317","volume-title":"Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS-31)","author":"K.P. Kihlstrom","year":"1998","unstructured":"Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: The SecureRing protocols for securing group communication. In: Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS-31), Kona, Hawaii, January 1998, vol.\u00a03, pp. 317\u2013326. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/ICDCS.1997.597857","volume-title":"Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS 1997)","author":"D. Malkhi","year":"1997","unstructured":"Malkhi, D., Merrit, M., Rodeh, O.: Secure reliable multicast protocols in a WAN. In: Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS 1997), Baltimore, MD, pp. 87\u201394. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-64216-1_49","volume-title":"Proceedings of the Second International Conference on Worldwide Com puting and Its Applications (WWCA 1998)","author":"K. Matsuura","year":"1998","unstructured":"Matsuura, K., Zheng, Y., Imai, H.: Compact and flexible resolution of CBT multicast key-distribution. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds.) WWCA 1998. LNCS, vol.\u00a01368, pp. 190\u2013205. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for scalable secure multicasting. SIGCOMM Computer Communication Review 27(4), 277\u2013288 (1997);","key":"#cr-split#-10_CR15.1","DOI":"10.1145\/263109.263179"},{"unstructured":"Conference Proceedings of the Communication Architectures, Protocols and Applications Conference","key":"#cr-split#-10_CR15.2"},{"issue":"6","key":"10_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/35.587717","volume":"35","author":"R. Oppliger","year":"1997","unstructured":"Oppliger, R., Albanese, A.: Participant registration, validation, and key distribution for large-scale conferencing systems. IEEE Communications Magazine\u00a035(6), 130\u2013134 (1997)","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"crossref","unstructured":"Phillips, G., Shenker, S., Tangmunarunkit, H.: Scaling of multicast trees: Comments on the Chuang-Sirbu scaling law. SIGCOMM Computer Communication Review 29(4), (October 1999);","key":"#cr-split#-10_CR17.1","DOI":"10.1145\/316194.316205"},{"unstructured":"Conference Proceedings of the Communication Architectures, Protocols and Applications Conference","key":"#cr-split#-10_CR17.2"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:58:58Z","timestamp":1556006338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/10719994_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}