{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T08:10:02Z","timestamp":1737619802878,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405238"},{"type":"electronic","value":"9783540376194"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-37619-4_38","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T23:51:13Z","timestamp":1194393073000},"page":"382-390","source":"Crossref","is-referenced-by-count":0,"title":["Key Agreement in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Ren-Junn","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Rong-Chi","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"issue":"17","key":"38_CR1","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"N. Asokan and Philip Ginzboorg. \u201cKey-agreement in ad hoc networks\u201d, Computer Communications, Vol. 23, No. 17, Nov. 2000, pp. 1627\u20131637.","journal-title":"Computer Communications"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. \u201cAuthenticated group key agreement and friends\u201d, In Proc. 5th ACM Conference on Computer and Communications Security, Nov. 1998, pp. 17\u201326.","DOI":"10.1145\/288090.288097"},{"issue":"4","key":"38_CR3","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/49.839937","volume":"8","author":"G. Ateniese","year":"2001","unstructured":"Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. \u201cNew multiparty authentication services and key agreement protocols\u201d, IEEE Journal on Selected Areas in Communications, Vol. 8, No. 4, Apr. 2001, pp. 628\u2013640.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Klaus Becker and Uta Wille. \u201cCommunication complexity of group key distribution\u201d, In Proc. 5th ACM Conference on Computer and Communications Security, Nov. 1998, pp. 1\u20136.","DOI":"10.1145\/288090.288094"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"S. Bellovin and M. Merritt, \u201cEncrypted key exchange: password-based protocols secure against dictionary attack\u201d, IEEE Symposium on Research in Security and Privacy, 1992, pp. 72\u201384.","DOI":"10.1109\/RISP.1992.213269"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, and M.E. Hellman, \u201cNew directions in cryptography\u201d, IEEE Trans. On Information Theory, Vol. IT-22, No.6, 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. On Information Theory"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Sahar M. Ghanem, Hussein Abdel-Wahab, \u201cA simple XOR-based technique for distributing group key in secure multicasting\u201d, In Proc. The Fifth IEEE Symposium on Computers and Communications, pp. 166\u2013171, 2000.","DOI":"10.1109\/ISCC.2000.860634"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, and G. Tsudik. \u201cSimple and fault-tolerant key agreement for dynamic collaborative group\u201d, In 7th ACM conference on Computer and communications, Nov. 2000, pp. 235\u2013244.","DOI":"10.1145\/352600.352638"},{"key":"38_CR9","unstructured":"Silja Maki, Maarit Hietalahti, and Tuomas Aura. \u201cA survey of ad-hoc network security\u201d, Interim report of project 007-security of mobile agents and ad-hoc societies, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Sep. 2000."},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Michael Steiner, Gene Tsudik, and Michael Waidner. \u201cCLIQUES: a new approach to group key agreement\u201d, In Proc. 18th International Conference on Distributed Computing Systems (ICDCS\u201998), May 1998, pp. 380\u2013387.","DOI":"10.1109\/ICDCS.1998.679745"},{"issue":"8","key":"38_CR11","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Michael Steiner, Gene Tsudik, and Michael Waidner. \u201cKey agreement in dynamic peer groups\u201d, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 8, Aug. 2000, pp. 769\u2013780.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-37619-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T04:00:52Z","timestamp":1737518452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-37619-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405238","9783540376194"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-37619-4_38","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}