{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:36:53Z","timestamp":1769157413346,"version":"3.49.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030578046","type":"print"},{"value":"9783030578053","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_12","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"122-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Short Message Multichannel Broadcast Encryption"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Luis","family":"Salazar","sequence":"first","affiliation":[]},{"given":"Jose","family":"Saldana","sequence":"additional","affiliation":[]},{"given":"Juli\u00e1n","family":"Fern\u00e1ndez-Navajas","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Ruiz-Mas","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Azuara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"12_CR1","unstructured":"Huawei, Smartphone Solutions White Paper, Issue 2, July 17, 2012. \nhttps:\/\/www.huawei.com\/mediafiles\/CBG\/PDF\/Files\/hw_193034.pdf\n\n. Accessed 3 Feb 2020"},{"key":"12_CR2","unstructured":"IEEE Std. 802-11. IEEE standard for wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification (1997). \nhttp:\/\/www.ieee802.org\/11\/\n\n. Accessed 3 Feb 2020"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Ginzburg, B., Kesselman, A.: Performance analysis of A-MPDU and A-MSDU aggregation in IEEE 802.11n. In: IEEE 2007 Sarnoff Symposium, pp. 1\u20135. IEEE, Princeton (2007)","DOI":"10.1109\/SARNOF.2007.4567389"},{"key":"12_CR4","first-page":"446","volume-title":"International Conference on Computer and Information Technology, IEEE CIT 2015","author":"J Saldana","year":"2015","unstructured":"Saldana, J., Fern\u00e1ndez-Navajas, J., Ruiz-Mas, J., et al.: Improving Network Efficiency with Simplemux. International Conference on Computer and Information Technology, IEEE CIT 2015, pp. 446\u2013453. IEEE, Liverpool (2015)"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/MCOM.2013.6658664","volume":"11","author":"J Saldana","year":"2013","unstructured":"Saldana, J., Fern\u00e1ndez-Navajas, J., Ruiz-Mas, J., et al.: Emerging real-time services: optimising traffic by smart cooperation in the network. IEEE Commun. Mag. 11, 127\u2013136 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TNSM.2017.2786660","volume":"15","author":"E Coronado","year":"2017","unstructured":"Coronado, E., Riggio, R., Villal\u00f3n, J., et al.: Efficient real-time content distribution for multiple multicast groups in SDN-based WLANs. IEEE Trans. Netw. Serv. Manage. 15(1), 430\u2013443 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11535218_16"},{"key":"12_CR8","unstructured":"Goh, E., Shacham, H., Modadugu, N., et al.: Sirius: securing remote untrusted storage. In: Proceedings of Network and Distributed System Security Symposium 2003, San Diego, USA, pp. 131\u2013145 (2003)"},{"key":"12_CR9","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., et al.: Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of USENIX Conference on File and Storage Technologies (FAST) 2003, pp. 29\u201342. USENIX, San Francisco (2003)"},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TCC.2015.2469662","volume":"5","author":"Z Yan","year":"2017","unstructured":"Yan, Z., Li, X.Y., Wang, M.J., Vasilakos, A.: Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. 5(3), 485\u2013498 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"12_CR11","unstructured":"Brandenburger, M., Cachin, C., Kne\u017eevi\u0107, N.: Don\u2019t trust the cloud verify: Integrity and consistency for cloud object stores. ACM Trans. Priv. Secur. (TOPS) 20(3), Article no. 8, 1\u201330 (2017)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Zheng, W., Li, F., Popa, et al.: MiniCrypt: reconciling encryption and compression for big data stores. In: Proceedings of the Twelfth European Conference on Computer Systems (EuroSys 2017), pp. 191\u2013204. ACM Press, New York (2017)","DOI":"10.1145\/3064176.3064184"},{"key":"12_CR13","first-page":"277","volume-title":"ASIACCS 2013","author":"DH Phan","year":"2013","unstructured":"Phan, D.H., Pointcheval, D., Trinh, V.C.: Multi-channel broadcast encryption. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.G. (eds.) ASIACCS 2013, pp. 277\u2013286. ACM Press, Hangzhou (2013)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45022-X_42","volume-title":"Automata, Languages and Programming","author":"O Baudron","year":"2000","unstructured":"Baudron, O., Pointcheval, D., Stern, J.: Extended notions of security for multicast public key cryptosystems. In: Montanari, U., Rolim, J.D.P., Welzl, E. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 499\u2013511. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-45022-X_42"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Park, Y.D., Jeon, S., Kim, K., et al.: Ramcast: reliable and adaptive multicast over IEEE 802.11n wlans. IEEE Commun. Lett. 20(7), 1441\u20131444 (2016)","DOI":"10.1109\/LCOMM.2016.2566642"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Park, Y.D., Jeon, S., Jeong, J.P., et al.: FlexVi: PHY aided flexible multicast for video streaming over IEEE 802.11 WLANs. IEEE Trans. Mob. Comput. (2019). In press","DOI":"10.1109\/TMC.2019.2923995"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:09:03Z","timestamp":1599476943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}