{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:00:18Z","timestamp":1725559218922},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_12","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"138-153","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Clustering for Multicast Key Distribution in MANETs"],"prefix":"10.1007","author":[{"given":"Mohamed Salah","family":"Bouassida","sequence":"first","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bettahar, H., Bouabdallah, A., Challal, Y.: An adaptive key management protocol for secure multicast. In: 11th International Conference on Computer Communications and Networks ICCCN, Florida, USA (October 2002)","DOI":"10.1109\/ICCCN.2002.1043065"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/978-3-540-24693-0_60","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"M.S. Bouassida","year":"2004","unstructured":"Bouassida, M.S., Chrisment, I., Festor, O.: An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 725\u2013742. Springer, Heidelberg (2004)"},{"key":"12_CR3","unstructured":"Bouassida, M.S., Lahmadi, A., Chrisment, I., Festor, O.: Diffusion multicast s\u00e9ecuris\u00e9e dans un environnement ad-hoc (1 vers n s\u00e9quentiel). In: Rapport de recherche, INRIA (September 2004)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications. ACM SIGCOMM Computer Communications Review\u00a034(2) (April 2004)","DOI":"10.1145\/997150.997157"},{"issue":"17","key":"12_CR5","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/S0140-3664(00)00255-3","volume":"23","author":"L. Dondeti","year":"1999","unstructured":"Dondeti, L., Mukherjee, S., Samal, A.: Secure one-to-many group communication sing dual encryption. Comput. Com-mun. 23(17), 1681\u20131701 (1999)","journal-title":"Comput. Com-mun."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Jones, B., Skellern, D.: Hiperlan channel assignment strategies. Electronics Letters (1997)","DOI":"10.1049\/el:19970767"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Lazos, L., Poovendram, R.: Energy-Aware Secure Multicast Communication in Ad Hoc Networks Using Geographical Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing (2003)","DOI":"10.21236\/ADA461548"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for scalable secure multicasting. In: SIGCOMM, pp. 277\u2013288 (1997)","DOI":"10.1145\/263105.263179"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Royer, E., Perkins, C.: Multicast Ad hoc On-Demand Distance Vector (MAODV) routing. IETF Internet Draft: draft-ietf-manet-maodv-00.txt (2000)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Sadowsky, J., Kafedziski, V.: On the Correlation and Scattering Functions of the WSSUS Channel for Mobile Communications. IEEE Transactions On Vehicular Technology\u00a047(1) (February 1998)","DOI":"10.1109\/25.661053"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TNET.2004.833129","volume":"12","author":"Y. Sun","year":"2004","unstructured":"Sun, Y., Trappe, W., Liu, K.: A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks. IEEE\/ACM Transactions on Networking\u00a012(4), 653\u2013666 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Wieselthier, J.E., Nguyen, G.D., Ephremides, A.: On the Construction of Energy-Efficient Broadcast and Multicast Trees in Wireless Networks. In: INFOCOM 2000, Tel-Aviv, Israel, March 26\u201330 (2000)","DOI":"10.1109\/INFCOM.2000.832232"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1011478717164","volume":"6","author":"J.E. Wieselthier","year":"2001","unstructured":"Wieselthier, J.E., Nguyen, G.D., Ephremides, A.: Algorithms for energy-efficient multicasting in static ad hoc wireless networks. Mobile Networks and Applications\u00a06(3), 251\u2013263 (2001)","journal-title":"Mobile Networks and Applications"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. Technical report, University of Texas at Austin (1997)","DOI":"10.1145\/285237.285260"},{"key":"12_CR15","unstructured":"Zhu, Y., Kunz, T.: Maodv implementation for ns-2.26 - systems and computing engineering, carleton university, technical report sce-04-01 (January 2004)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T10:22:26Z","timestamp":1635675746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11422778_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}