{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:28:06Z","timestamp":1725492486636},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540658955"},{"type":"electronic","value":"9783540488880"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48888-x_37","type":"book-chapter","created":{"date-parts":[[2007,10,5]],"date-time":"2007-10-05T08:17:59Z","timestamp":1191572279000},"page":"385-397","source":"Crossref","is-referenced-by-count":0,"title":["Key Management Framework for IP Multicast Infrastructure Security"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Hardjono","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,4,15]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"D. Waitzman, C. Partridge, and S. Deering, \u201cDistance Vector Multicast Routing Protocol,\u201d RFC 1075, IETF, 1988.","DOI":"10.17487\/rfc1075"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"T. Ballardie, P. Francis, and J. Crowcroft, \u201cCore Based Trees: An architecture for scalable inter-domain multicast routing,\u201d in Proceedings of ACM SIGCOMM\u201993, (San Francisco), pp. 85\u201395, ACM, 1993.","DOI":"10.1145\/167954.166246"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"J. Moy, \u201cMulticast extensions to OSPF,\u201d RFC 1584, IETF, 1994.","DOI":"10.17487\/rfc1584"},{"key":"37_CR4","unstructured":"S. Deering, D. Estrin, D. Farinacci, M. Handley, A. Helmy, V. Jacobson, C. Liu, P. Sharma, D. Thaler, and L. Wei, \u201cProtocol Independent Multicast \u2014 Sparse Mode: Motivations and Architecture,\u201d August 1998. draft-ietf-pim-arch-05.txt ( http:\/\/www.ietf.org )"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"S. Deering, \u201cHost extensions for IP multicasting,\u201d RFC 1112, IETF, 1989.","DOI":"10.17487\/rfc1112"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"W. Fenner, \u201cInternet group management protocol version 2,\u201d RFC 2236, IETF, 1997.","DOI":"10.17487\/rfc2236"},{"key":"37_CR7","unstructured":"B. Cain, S. Deering, and A. Thyagarajan, \u201cInternet group management protocol version 3,\u201d tech. rep., IETF, November 1997. draft-ietf-idmr-igmp-v3-00.txt."},{"key":"37_CR8","unstructured":"R. Perlman, \u201cNetwork layer protocols with byzantine robustness,\u201d Technical Report MIT\/LCS\/TR-429, Massachusetts Institute of Technology, October 1988."},{"key":"37_CR9","volume-title":"Proceedings of the 1996 Network and Distributed System Security Symposium NDSS\u201996","author":"S. L. Murphy","year":"1996","unstructured":"S. L. Murphy and M. R. Badger, \u201cDigital signature protection of OSPF routing protocol,\u201d in Proceedings of the 1996 Network and Distributed System Security Symposium NDSS\u201996, (San Diego), ISOC, 1996."},{"key":"37_CR10","volume-title":"Proceedings of the 1995 Network and Distributed Systems Security Symposium NDSS\u201995","author":"T. Ballardie","year":"1995","unstructured":"T. Ballardie and J. Crowcroft, \u201cMulticast-specific security threats and countermeasures,\u201d in Proceedings of the 1995 Network and Distributed Systems Security Symposium NDSS\u201995, (San Diego), ISOC, 1995."},{"key":"37_CR11","unstructured":"L. Wei, \u201cAuthenticating PIM version 2 messages,\u201d Nov 1998. draft-ietf-pim-v2-auth-00.txt. ( http:\/\/www.ietf.org )."},{"key":"37_CR12","unstructured":"T. Hardjono, B. Cain, and N. Doraswamy, \u201cA framework for group key management for multicast security,\u201d July 1998. draft-ietf-ipsec-gkmframework-00.tx. ( http:\/\/www.ietf.org )."},{"key":"37_CR13","unstructured":"T. Hardjono, B. Cain, and I. Monga, \u201cIntra-domain group key management protocol,\u201d Nov 1998. draft-ietf-ipsec-intragkm-00.txt. ( http:\/\/www.ietf.org )"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, \u201cGroup key management protocol (GKMP) specification,\u201d RFC 2093, IETF, July 1997.","DOI":"10.17487\/rfc2093"},{"key":"37_CR15","unstructured":"D. Thaler, D. Estrin, and D. Meyer, \u201cBorder Gateway Multicast Protocol (BGMP),\u201d Nov 1998. draft-ietf-idmr-gum-04.txt. ( http:\/\/www.ietf.org )"},{"key":"37_CR16","unstructured":"Dino Farinacci, Yakov Rekhter, Peter Lothberg, Hank Kilmer, and Jeremy Hall, \u201cMulticast Source Discovery Protocol\u201d(MSDP), IETF internet-draft, draft-farinacci-msdp-00.txt. ( http:\/\/www.ietf.org )"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, \u201cSecurity architecture for the Internet Protocol,\u201d RFC 2401, IETF, Nov 1998.","DOI":"10.17487\/rfc2401"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, \u201cIP authentication header,\u201d RFC 2402, IETF, Nov 1998.","DOI":"10.17487\/rfc2402"}],"container-title":["Lecture Notes in Computer Science","Intelligence in Services and Networks Paving the Way for an Open Service Market"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48888-X_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T15:07:28Z","timestamp":1556896048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48888-X_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540658955","9783540488880"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48888-x_37","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}