{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:55Z","timestamp":1748664715114,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_16","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T20:20:13Z","timestamp":1444076413000},"page":"161-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"N.","family":"Renugadevi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Mala","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2014.11.001","volume":"50","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Kiah, M.L.M., Shamshirband, S., Rehman, M.H.U.: Toward secure group communication in wireless mobile environments: issues, solutions, and challenges. J. Netw. Comput. Appl. 50, 1\u201314 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"16_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola","year":"1999","unstructured":"Mitola, J., Maguire Jr, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13\u201318 (1999)","journal-title":"IEEE Pers. Commun."},{"key":"16_CR3","first-page":"72","volume":"42","author":"D Grandblaise","year":"2004","unstructured":"Grandblaise, D., Bourse, D., Moessner, K., Leaves, P.: Dynamic spectrum allocation (DSA) and reconfigurability. IEEE Commun. Mag. 42, 72\u201381 (2004)","journal-title":"IEEE Commun. Mag."},{"key":"16_CR4","volume-title":"Cognitive Radio Communications and Networks: Principles and Practice","author":"AM Wyglinski","year":"2009","unstructured":"Wyglinski, A.M., Nekovee, M., Hou, T.: Cognitive Radio Communications and Networks: Principles and Practice. Academic Press, New York (2009)"},{"issue":"4","key":"16_CR5","first-page":"103","volume":"5","author":"A Armando","year":"2014","unstructured":"Armando, A., Bocci, G., Chiarelli, G., Costa, G., De Maglie, G., Mammoliti, R., Merlo, A.: Mobile App security analysis with the MAVeriC static analysis module. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 5(4), 103\u2013119 (2014)","journal-title":"J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"issue":"4","key":"16_CR6","first-page":"21","volume":"3","author":"S Kiyomoto","year":"2012","unstructured":"Kiyomoto, S., Fukushima, K., Miyake, Y.: Design of categorization mechanism for disaster-information-gathering system. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(4), 21\u201334 (2012)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"issue":"1","key":"16_CR7","first-page":"37","volume":"6","author":"B Pokri\u0107","year":"2015","unstructured":"Pokri\u0107, B., Kr\u010do, S., Draji\u0107, D., Pokri\u0107, M., Rajs, V., Mihajlovi\u0107, \u017d., Kne\u017eevi\u0107, P., Jovanovi\u0107, D.: Augmented reality enabled IoT services for environmental monitoring utilising serious gaming concept. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6(1), 37\u201355 (2015)","journal-title":"J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"key":"16_CR8","volume-title":"Secure group communications over data networks","author":"X Zou","year":"2007","unstructured":"Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure group communications over data networks. Springer Science & Business Media, Newyork (2007)"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/TNET.2006.872575","volume":"14","author":"PC Lee","year":"2006","unstructured":"Lee, P.C., Lui, C.S., Yau, K.Y.: Distributed collaborative key agreement and authentication protocols for dynamic peer groups. IEEE\/ACM Trans. Networking 14(2), 263\u2013276 (2006)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerance key agreement for dynamic collaborative groups. In: 7th ACM Conference on Computer and Communications Security, pp. 235\u2013244 (2000)","DOI":"10.1145\/352600.352638"},{"issue":"6","key":"16_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"16_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"issue":"2","key":"16_CR13","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.comnet.2011.10.006","volume":"56","author":"H Rif\u00e1-Pous","year":"2012","unstructured":"Rif\u00e1-Pous, H., Garrigues, C.: Authenticating hard decision sensing reports in cognitive radio networks. Comput. Netw. 56(2), 566\u2013576 (2012)","journal-title":"Comput. Netw."},{"issue":"5","key":"16_CR14","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"AT Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software Eng. 29(5), 444\u2013458 (2003)","journal-title":"IEEE Trans. Software Eng."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Vijayakumar, P., Bose, S., Kannan, A., Subramanian, S.S.: An effective key distribution protocol for secure multicast communication. In: IEEE 2010 Second International Conference on Advanced Computing (ICoAC), pp. 102\u2013107 (2010)","DOI":"10.1109\/ICOAC.2010.5725367"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, F., Xu, J., Lin, L., Xu, H.: Multicast key management scheme based on TOFT. In: 10th IEEE International Conference on HPCC 2008, pp. 1030\u20131035 (2008)","DOI":"10.1109\/HPCC.2008.90"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Lin, J.C., Lai, F., Lee, H.C.: Efficient group key management protocol with one-way key derivation. In: IEEE Conference on Local Computer Networks, pp. 336\u2013343 (2005)","DOI":"10.1109\/LCN.2005.61"},{"issue":"8","key":"16_CR18","doi-asserted-by":"publisher","first-page":"2526","DOI":"10.1016\/j.adhoc.2013.05.017","volume":"11","author":"A Sulaiman","year":"2013","unstructured":"Sulaiman, A., Raja, S.K., Park, S.H.: Improving scalability in vehicular communication using one-way hash chain method. Ad Hoc Netw. 11(8), 2526\u20132540 (2013)","journal-title":"Ad Hoc Netw."},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A.K., Goswami, A.: A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inf. Sci. 269, 270\u2013285 (2014)","journal-title":"Inf. Sci."},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"3207","DOI":"10.1007\/s11042-013-1780-6","volume":"74","author":"Q Mao","year":"2013","unstructured":"Mao, Q., Chang, C.C., Harn, L., Chang, S.C.: An image-based key agreement protocol using the morphing technique. Multimedia Tools Appl. 74, 3207\u20133229 (2013)","journal-title":"Multimedia Tools Appl."},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104\u2013130 (2015)","journal-title":"Inf. Sci."},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Li, B., Yang, Y., Lu, Z., Yuan, B., Long, T.: Secure distributed batch rekeying algorithm for dynamic group. In: 2012 IEEE 14th International Conference on Communication Technology (ICCT), pp. 664\u2013667 (2012)","DOI":"10.1109\/ICCT.2012.6511288"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume-title":"Fast Software Encryption","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371\u2013388. Springer, Heidelberg (2004)"},{"key":"16_CR24","first-page":"1215","volume":"2","author":"J Zhang","year":"2006","unstructured":"Zhang, J., Li, B., Chen, C.X., Tao, P., Yang, S.Q.: EDKAS: a efficient distributed key agreement scheme using one way function trees for dynamic collaborative groups. IEEE IMACS Multiconference Comput. Eng. Syst. Appl. 2, 1215\u20131222 (2006)","journal-title":"IEEE IMACS Multiconference Comput. Eng. Syst. Appl."},{"issue":"11","key":"16_CR25","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.tcs.2008.10.034","volume":"410","author":"M Li","year":"2009","unstructured":"Li, M., Feng, Z., Zang, N., Graham, R.L., Yao, F.F.: Approximately optimal trees for group key management with batch updates. Theoret. Comput. Sci. 410(11), 1013\u20131021 (2009)","journal-title":"Theoret. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:37:30Z","timestamp":1748644650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}