{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:09:01Z","timestamp":1725487741057},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426622"},{"type":"electronic","value":"9783540454397"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45439-x_3","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T13:44:53Z","timestamp":1185025493000},"page":"27-45","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Kerberized Multicast in a Practical Distributed Setting"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Olga","family":"Kornievskaia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"K. Becker and U. Wille. Communication complexity of group key distribution. In Proceedings ofthe 5th ACM Conference on Computer and Communication Security, pages 1\u20136, San Francisco, CA, November 1998.","DOI":"10.1145\/288090.288094"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Miccianco, M. Naor, and B. Pinkas. Multicast security: A taxonomy and efficient authentication. In IEEE INFOCOMM, 1999.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"3_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Efficient communication storage tradeoffs for multicast encryption","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, T. Malkin, and K. Nissim. Efficient communication storage tradeoffs for multicast encryption. In Proceedings of \u201cA dvances in Cryptology-EUROCRYPT\u2019 99\u201d, Lecture Notes in Computer Science, Springer Verlag, 1999."},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography. IEEE Transaction on Information Theory, 22:644\u2013654, November 1976.","journal-title":"IEEE Transaction on Information Theory"},{"key":"3_CR5","unstructured":"M. Hur, B. Tung, T. Ryutov, C. Neuman, A. Medvinsky, G. Tsudik, and B. Sommerfeld. Public key cryptography for cross-realm authentication in kerberos, May 2001. Internet draft."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proceedings ofthe 7th ACM Conference on Computer and Communication Security, CCS\u201900, pages 235\u2013244, November 2000.","DOI":"10.1145\/352600.352638"},{"key":"3_CR7","unstructured":"F. MacWilliams and N. Sloane. The theory oferr or-correcting codes. Elsevier Science, 1977."},{"issue":"12","key":"3_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"R. Needham and M. Shroeder. Using encryption for authentication in large networks of computers. Communications ofthe ACM, 21(12):993\u2013999, December 1978.","journal-title":"Communications ofthe ACM"},{"issue":"9","key":"3_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"C. Neuman","year":"1994","unstructured":"C. Neuman and T. Ts\u2019o. Kerberos: an authentication service for computer networks. IEEE Communications, 32(9):33\u201338, September 1994.","journal-title":"IEEE Communications"},{"key":"3_CR10","unstructured":"A. Perrig. Efficient collaborative key management protocols for secure autonomous group communication. In CryptTEC, 1999."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, and M. Waidner. Diffie-hellman key distribution extended to groups. In Proceedings ofthe 3rd ACM Conference on Computer and Communications in Security, CCS\u201996, pages 31\u201337, March 1996.","DOI":"10.1145\/238168.238182"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"D. Wallner, E. Harder, and R. Agee. Key management for multicast: Issues and architectures, June 1999. RFC 2627.","DOI":"10.17487\/rfc2627"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"C. Wong, M. Gouda, and S. Lam. Secure group communication using key graphs. In Proceedings ofthe ACM SIGCOMM\u201998, pages 68\u201379, September 1998.","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45439-X_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T07:33:21Z","timestamp":1556696001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45439-X_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426622","9783540454397"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45439-x_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}