{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:44:01Z","timestamp":1743108241869,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_62","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"678-690","source":"Crossref","is-referenced-by-count":0,"title":["Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications"],"prefix":"10.1007","author":[{"given":"Wei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lijuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"issue":"3","key":"62_CR1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309\u2013329 (2003)","journal-title":"ACM Comput. Surv."},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group communications. In: IEEE INFOCOM 2004, vol. 2, pp. 1296\u20131306. IEEE Press, Hong Kong (2004)","DOI":"10.1109\/INFCOM.2004.1357015"},{"key":"62_CR3","doi-asserted-by":"publisher","unstructured":"Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch rekeying for secure group communications. In: The 10th International Conference on World Wide Web, pp. 525\u2013534, Hong Kong (2001). doi:\n                      10.1145\/371920.372153","DOI":"10.1145\/371920.372153"},{"issue":"11\u201312","key":"62_CR4","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1016\/j.comcom.2007.04.019","volume":"30","author":"G Wang","year":"2007","unstructured":"Wang, G., Ouyang, J., Chen, H., Guo, M.: Efficient group key management for multi-privileged groups. Comput. Commun. 30(11\u201312), 2497\u20132509 (2007)","journal-title":"Comput. Commun."},{"key":"62_CR5","doi-asserted-by":"publisher","unstructured":"Pegueroles, J., Rico-Novella, F.: Balanced batch LKH: new proposal, implementation and performance evaluation. In: 2003 IEEE Symposium on Computers and Communications (ISCC), pp. 815\u2013828. IEEE Press, Turkey (2003). doi:\n                      10.1109\/ISCC.2003.1214218","DOI":"10.1109\/ISCC.2003.1214218"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Gu, X., Wang, Y., Zhou, W.: A key tree merge algorithm in multi-privileged groups. In: 2013 IEEE 16th International Conference on Computational Science and Engineering, pp. 288\u2013294. IEEE Press, Sydney, Australia 3\u20135 December 2013","DOI":"10.1109\/CSE.2013.53"},{"issue":"4","key":"62_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cose.2006.02.006","volume":"25","author":"WHD Ng","year":"2006","unstructured":"Ng, W.H.D., Cruickshank, H., Sun, Z.: Scalable balanced batch rekeying for secure group communication. Comput. Secur. 25(4), 265\u2013273 (2006)","journal-title":"Comput. Secur."},{"issue":"8","key":"62_CR8","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1016\/j.adhoc.2013.05.009","volume":"11","author":"L Veltri","year":"2013","unstructured":"Veltri, L., Cirani, S., Ferrari, G.: A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw. 11(8), 2724\u20132737 (2013)","journal-title":"Ad Hoc Netw."},{"key":"62_CR9","doi-asserted-by":"publisher","unstructured":"Li, G., Li, B., Du, T., Pan, J., Li, Y.: Batch rekeying model based on queuing theory in secure group communications. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 247\u2013250. IEEE Press, Beijing, China. doi:\n                      10.1109\/ICITIS.2010.5689453","DOI":"10.1109\/ICITIS.2010.5689453"},{"key":"62_CR10","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s11276-007-0032-y","volume":"14","author":"J Cho","year":"2008","unstructured":"Cho, J., Chen, I., Eltoweissy, M.: On optimal batch rekeying for secure group communications in wireless networks. Wireless Netw. 14, 915\u2013927 (2008). doi:\n                      10.1007\/s11276-007-0032-y","journal-title":"Wireless Netw."},{"issue":"5","key":"62_CR11","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1002\/sec.351","volume":"5","author":"A Muthulakshmi","year":"2012","unstructured":"Muthulakshmi, A., Anitha, R.: Balanced key tree management for multi-privileged groups using (N, T) policy. Secur. Commun. Netw. 5(5), 545\u2013555 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"62_CR12","first-page":"81","volume":"17","author":"Y Xu","year":"2014","unstructured":"Xu, Y., Zhou, W., Wang, G.: Multiway tree-based group key management using Chinese remainder theorem for multi-privileged group communications. J. Appl. Sci. Eng. 17(1), 81\u201392 (2014)","journal-title":"J. Appl. Sci. Eng."},{"key":"62_CR13","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2009.08.007","volume":"33","author":"D Je","year":"2010","unstructured":"Je, D., Lee, J., Park, Y., Seo, S.: Computation-and-storage-efficient key tree management protocol for secure multicast communications. Comput. Commun. 33, 136\u2013148 (2010)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:53:34Z","timestamp":1559303614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}