{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:37:58Z","timestamp":1725485878918},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_34","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"497-509","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Efficient Multicast Key Management for Stateless Receivers"],"prefix":"10.1007","author":[{"given":"Ju","family":"Hee Ki","sequence":"first","affiliation":[]},{"given":"Hyun","family":"Jeong Kim","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Hoon Lee","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Seop Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"R. Canett, J. Garay, G. Itkis, K. Micciancio, M. Naor, and B. Pinkas.multicast Security:A Taxonom and Some Efficient construcions. In Proc,of INFOCOM 99, 1999. 498","key":"34_CR1","DOI":"10.1109\/INFCOM.1999.751457"},{"unstructured":"G. Caronni, M. Waldvogel, D. Sunand, and B. Plattner. Efficient Securit for Large and Dynamic Multicast Groups. In Workshop on Enabling Technologies, (WETICE 98). IEEE Comp Society Press, 1998. 498,507","key":"34_CR2"},{"doi-asserted-by":"crossref","unstructured":"I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and K. Saha. Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniqueis. In IEEE NFOCOM, March 1999. 498","key":"34_CR3","DOI":"10.1109\/INFCOM.1999.751455"},{"doi-asserted-by":"crossref","unstructured":"M. Karnaugh. The Map Method for Sysnthesis of Combinational Logic Circuits., Transact ons AIEE,Commun cat ons and Electronics, Vol. 72, pp. 593\u2013599, November 1953.498","key":"34_CR4","DOI":"10.1109\/TCE.1953.6371932"},{"key":"34_CR5","series-title":"Technical Report","volume-title":"Key Establishment in Large Dynamic Groups Using One-Wa Function Trees","author":"D.A. McGrew","year":"1998","unstructured":"D.A. McGrew and A.T. Sherman. Key Establishment in Large Dynamic Groups Using One-Wa Function Trees. Technical Report No. 0755, TIS Labs at Network Associates,Inc., Glenwood, MD, May 1998. 498,507"},{"key":"34_CR6","series-title":"Lect Notes Comput Sci","first-page":"41","volume-title":"Revocation and Tracing Schemes for Stateless Receivers n Cryptology-CRYPTO 2001","author":"D. Naor","year":"2002","unstructured":"D. Naor, M. Naor and J. Lotspiech Revocation and Tracing Schemes for Stateless Receivers n Cryptology-CRYPTO 2001, Lecture Notes in Computer Science, vol 2139, 2002, pp. 41\u201362. 499"},{"unstructured":"A. Perrig, D. Song, and J.D. Tygar. ELK,a New Protocol for Efficient Large-Group Key Kistribution. In 2001 IEEE Symposium on Security and Privacy, Oak-land,CA,USA, May 2001. 498","key":"34_CR7"},{"issue":"4","key":"34_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/506084.506087","volume":"35","author":"C.-S. Park","year":"2001","unstructured":"C.-S. Park and D.H. Lee Secure and efficient key management for dynamic multi-cast groups. Operation Systems Review, ACM, Vol. 35, No. 4, pp 32\u201338, Oct. 2001. 498","journal-title":"Operation Systems Review, ACM"},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-45546-9_12","volume-title":"EHBT:An efficient protocol for group key management","author":"S. Rafaeli","year":"2001","unstructured":"S. Rafaeli, L. Mathy, and D. Hutchison. EHBT:An efficient protocol for group key management. Proc.of 3rd Intl.COST264 Workshop on Networked Group Commun cat on (NGC 2001) Lecture Notes in Computer Science 2233, Springer, pp. 159\u2013171. 2001. 498,507"},{"doi-asserted-by":"crossref","unstructured":"M. Steiner, G. TsudiK, and M. Wakdner. Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed System, March 2000. 498","key":"34_CR10","DOI":"10.1109\/71.877936"},{"doi-asserted-by":"crossref","unstructured":"D. Wallner, E. Harder, and R. Agee. Key management for a multicast:Issues and Arch tectures RFC 2627, June 1999. 498","key":"34_CR11","DOI":"10.17487\/rfc2627"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:45:24Z","timestamp":1558259124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}