{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:35Z","timestamp":1725560195479},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540284673"},{"type":"electronic","value":"9783540317364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11545163_33","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T18:16:31Z","timestamp":1279563391000},"page":"327-336","source":"Crossref","is-referenced-by-count":1,"title":["Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Eunjong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ross","family":"McConnell","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Massey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., et al.: Introduction to Algorithms, 2nd edn. McGraw Hill, New York (2001)","edition":"2"},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M. Rabin","year":"1989","unstructured":"Rabin, M.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM\u00a036(2), 335\u2013348 (1989)","journal-title":"Journal of the ACM"},{"key":"33_CR3","first-page":"313","volume-title":"Research Directions in Data and Applications Security, Proceedings of the 16th IFIP TC-11, WG 11.3 Working Conference on Data and Applications Security","author":"I. Ray","year":"2003","unstructured":"Ray, I., Ray, I.: Anonymous and Secure Multicast Subscription. In: Gudes, E., Shenoi, S. (eds.) Research Directions in Data and Applications Security, Proceedings of the 16th IFIP TC-11, WG 11.3 Working Conference on Data and Applications Security, pp. 313\u2013327. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"33_CR4","unstructured":"RSA Laboratories. RSA Laboratories\u2019 Frequently Asked Questions About Today\u2019s Cryptography, Version 4.1 (2004), \n                    \n                      http:\/\/www.rsasecurity.com\/rsalabs\/\n                    \n                    \n                   (last accessed on December 10, 2004)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11545163_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:56Z","timestamp":1619506616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11545163_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540284673","9783540317364"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/11545163_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}