{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:00:33Z","timestamp":1725573633524},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540303176"},{"type":"electronic","value":"9783540322726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11587514_12","type":"book-chapter","created":{"date-parts":[[2005,10,26]],"date-time":"2005-10-26T09:51:49Z","timestamp":1130320309000},"page":"169-183","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management"],"prefix":"10.1007","author":[{"given":"Abdulhadi","family":"Shoufan","sequence":"first","affiliation":[]},{"given":"Sorin A.","family":"Huss","sequence":"additional","affiliation":[]},{"given":"Murtuza","family":"Cutleriwala","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. of ACM SIGCOMM, Cannes (September 1997)","DOI":"10.1145\/263105.263179"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Proc. of First International Workshop on Networked Group Communication (NGC), Pisa (November 1999)","DOI":"10.1007\/978-3-540-46703-8_19"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"K. Wong","year":"2000","unstructured":"Wong, K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE\/ACM Trans. On Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Trans. On Networking"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. RFC 2627, IETF (June 1999)","DOI":"10.17487\/rfc2627"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Li, X., Yang, Y.R., Gouda, M., Lam, S.S.: Batch Rekeying for Secure Group Communications. In: Proc. of Int. WWW Conf., Hong Kong (May 2001)","DOI":"10.1145\/371920.372153"},{"key":"12_CR6","unstructured":"Yang, Y.R., et al.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-irtf-smug-groupkeymgmt-oft-00.txt (August 2000) work in progress"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Yang, Y.R., et al.: Reliable Group Rekeying: Design and Performance Analysis. In: Proc. of ACM SIGCOMM, San Diego, CA (August 2001)","DOI":"10.1145\/383059.383062"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, X.B., et al.: Protocol Design for Scalable and Reliable Group Rekeying. In: Proc. of SPIE Conference on Scalability and Traffic Control in IP Networks, Denver (August 2001)","DOI":"10.1117\/12.434417"},{"key":"12_CR9","unstructured":"Shoufan, A., Huss, S.A.: A Scalable Rekeying Processor for Multicast Pay-TV on Reconfigurable Platforms. In: Workshop on Application Specific Processors, IEEE\/ACM Int. Conf. on Hardware\/Software Codesign and System Synthesis, Stockholm (September 2004)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Goshi, L.: Algorithms for Dynamic Multicast Key Distribution Trees. In: Proc. of ACM Symposium on Principles of Distributed Computing, Boston (2003)","DOI":"10.1145\/872035.872071"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/997150.997157","volume":"34","author":"Y. Challal","year":"2004","unstructured":"Challal, Y., et al.: SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications. ACM SIGCOMM Computer Communications Review\u00a034(2), 55\u201370 (2004)","journal-title":"ACM SIGCOMM Computer Communications Review"},{"key":"12_CR12","unstructured":"NIST: Advanced Encryption Standard (AES) Federal Information Processing Standards Publication 197 (November 26, 2001)"},{"key":"12_CR13","unstructured":"NIST: Key Management Using ANSI X9.17. Federal Information Processing Standards Publication FIPS171"},{"key":"12_CR14","unstructured":"Alpha Data Inc.: ADM-XRC-PRO-Lite (ADM-XPL), Hardware Manual"},{"key":"12_CR15","unstructured":"Xilinx Inc.: VirtexII-Pro Data Sheet and User Guide"},{"key":"12_CR16","unstructured":"Synplicity Inc.: Synplify Pro 7.3.3, http:\/\/www.synplicity.com"}],"container-title":["Lecture Notes in Computer Science","High Performance Embedded Architectures and Compilers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11587514_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:01:29Z","timestamp":1605625289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11587514_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540303176","9783540322726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11587514_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}