{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:19Z","timestamp":1725489919524},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_20","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T03:42:01Z","timestamp":1187149321000},"page":"181-190","source":"Crossref","is-referenced-by-count":0,"title":["Secure Source Specific Multicast for Networks Including Mobile Hosts"],"prefix":"10.1007","author":[{"given":"Young-Chul","family":"Shim","sequence":"first","affiliation":[]},{"given":"Jun-Cheol","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"S. Deering: Host Extensions for IP Multicasting. IETF RFC 1112, Aug. (1989)","key":"20_CR1","DOI":"10.17487\/rfc1112"},{"unstructured":"H. Holbrook, B. Cain: Source-Specific Multicast for IP. IETF Draft, Nov. (2001)","key":"20_CR2"},{"doi-asserted-by":"crossref","unstructured":"C. Jelger, T. Noel: Multicast for Mobile hosts in IP Networks: Progress and Challenges. IEEE Wireless Communications, Oct. (2002)","key":"20_CR3","DOI":"10.1109\/MWC.2002.1043855"},{"doi-asserted-by":"crossref","unstructured":"S. Mittra: Iolus: A Framework for Scalable Secure Multicasting. ACM Sigcomm Conference, (1997)","key":"20_CR4","DOI":"10.1145\/263105.263179"},{"doi-asserted-by":"crossref","unstructured":"C. Wong, M. Gouda, S. Lam: Secure Group Communications using Key Graphs. ACM Sigcomm Conference, (1998)","key":"20_CR5","DOI":"10.1145\/285237.285260"},{"doi-asserted-by":"crossref","unstructured":"C. Shields, J.J. Garcia-Luna-Aceves: KHIP-A Scalable Protocol for Secure Multicast Routing. ACM Sigcomm Conference, (1999)","key":"20_CR6","DOI":"10.1145\/316188.316206"},{"doi-asserted-by":"crossref","unstructured":"L. Gong, N. Shacham: Multicast Security and its Extension to a Mobile Environment. Wireless Networks, (1995)","key":"20_CR7","DOI":"10.1007\/BF01200847"},{"doi-asserted-by":"crossref","unstructured":"R. Shankaran, V. Varadharajan, M. Hitchens: Secure Multicast Extensions for Mobile Networks. IEEE Conference on Local Computer Networks, (1999)","key":"20_CR8","DOI":"10.1109\/LCN.1999.802004"},{"doi-asserted-by":"crossref","unstructured":"D. Bruschi, E. Rosti: Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues, Mobile Networks and Applications, (2002)","key":"20_CR9","DOI":"10.1023\/A:1020781305639"},{"unstructured":"N. Bhaskar, I. Kouvelas: Source-Specific Protocol Independent Multicast. IETF Draft, March (2000","key":"20_CR10"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T22:13:31Z","timestamp":1556748811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}