{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:57:09Z","timestamp":1742954229026,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_28","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"275-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Multicast Key Agreement Scheme"],"prefix":"10.1007","author":[{"given":"Hsing-Chung","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chung-Wei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"issue":"24","key":"28_CR1","doi-asserted-by":"publisher","first-page":"5598","DOI":"10.1016\/j.ins.2007.05.026","volume":"177","author":"H-C Chen","year":"2007","unstructured":"Chen, H.-C., Wang, S.-J., Wen, J.-H.: Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24), 5598\u20135610 (2007)","journal-title":"Inf. Sci."},{"issue":"1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1002\/sec.536","volume":"6","author":"H-C Chen","year":"2013","unstructured":"Chen, H.-C.: Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. Secur. Commun. Netw. 6(1), 100\u2013107 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"28_CR3","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.2298\/CSIS130924066C","volume":"11","author":"H-C Chen","year":"2014","unstructured":"Chen, H.-C., Yang, C.-Y., Su, H.-K., Wei, C.-C., Lee, C.-C.: A secure E-mail protocol using ID-based FNS multicast mechanism. Comput. Sci. Inf. Syst. 11(3), 1091\u20131112 (2014). Special Issue on Mobile Collaboration Technologies and Internet Services","journal-title":"Comput. Sci. Inf. Syst."},{"key":"28_CR4","unstructured":"Wu, K.P., Ruan, S.J., Lai, F., Tseng, C.K.: On key distribution in secure multicasting. In: Proceedings of 25th Annual IEEE International Conference on Local Computer Networks, p. 208 (2000)"},{"issue":"7","key":"28_CR5","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y Kim","year":"2001","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. IEEE Trans. Comput. 53(7), 905\u2013921 (2001)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"28_CR6","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60\u201396 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"28_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/377769.377776","volume":"19","author":"A Fekete","year":"2001","unstructured":"Fekete, A., Lynch, N., Shvartsman, A.: Specifying and using a partionable group communication service. ACM Trans. Comput. Syst. 19(2), 171\u2013216 (2001)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"28_CR8","first-page":"55","volume":"4","author":"X Chen","year":"2013","unstructured":"Chen, X., Lenzini, G., Mauw, S., Pang, J.: Design and formal analysis of a group signature based electronic toll pricing system. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 55\u201375 (2013)","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"1","key":"28_CR9","first-page":"76","volume":"4","author":"S Cra\u00df","year":"2013","unstructured":"Cra\u00df, S., D\u00f6nz, T., Joskowicz, G., K\u00fchn, E., Marek, A.: Securing a space-based service architecture with coordination-driven access control. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 76\u201397 (2013)","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"2","key":"28_CR10","first-page":"113","volume":"6","author":"S Malik","year":"2015","unstructured":"Malik, S., Lee, J.-H.: Privacy enhancing factors in people-nearby applications. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 6(2), 113\u2013121 (2015)","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"2","key":"28_CR11","first-page":"24","volume":"5","author":"AD Kent","year":"2014","unstructured":"Kent, A.D., Liebrock, L.M., Wernicke, J.: Differentiating user authentication graphs. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 24\u201338 (2014)","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"28_CR12","unstructured":"Moser, L.E., Amir, Y., Melliar-Smith, P.M., Agarwal, D.A.: Extended virtual synchrony. In: Proceedings of the IEEE 14th International Conference on Distributed Computing Systems, pp. 55\u201365 (1994)"},{"issue":"2","key":"28_CR13","first-page":"449","volume":"28","author":"JH Wen","year":"2008","unstructured":"Wen, J.H., Wu, M.C., Chen, T.S.: A novel elliptic curve method for secure multicast system. Far East J. Math. Sci. 28(2), 449\u2013467 (2008)","journal-title":"Far East J. Math. Sci."},{"issue":"6","key":"28_CR14","first-page":"700","volume":"E84-D","author":"KP Wu","year":"2001","unstructured":"Wu, K.P., Ruan, S.J., Tseng, C.K., Lai, F.: Hierarchical access control using the secure filter. IEICE Trans. Inf. Syst. E84-D(6), 700\u2013708 (2001)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"28_CR15","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:49:42Z","timestamp":1569383382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}