{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:46:35Z","timestamp":1725565595167},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_60","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"725-742","source":"Crossref","is-referenced-by-count":5,"title":["An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Mohamed Salah","family":"Bouassida","sequence":"first","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"The Symposium on High Performance Distributed Computing","author":"K Almeroth","year":"1996","unstructured":"K. Almeroth and M. Ammar. Collecting and modelling the join-leave behaviour of multicast group members in the mbone. In The Symposium on High Performance Distributed Computing, Syracuse NY, 1996."},{"key":"60_CR2","volume-title":"Workshop on Issues in the Theory of Security, 2002","author":"M Archer","year":"2002","unstructured":"M. Archer. Proving correctness of the basic tesla multicast stream authentication protocol with tame. In Workshop on Issues in the Theory of Security, 2002, 2002."},{"key":"60_CR3","volume-title":"11th International Conference on Computer Communications and Networks ICCCN","author":"H Bettahar","year":"2002","unstructured":"H. Bettahar, A. Bouabdallah, and Y. Challal. An adaptive key management protocol for secure multicast. In 11th International Conference on Computer Communications and Networks ICCCN, Florida USA, October 2002."},{"key":"60_CR4","volume-title":"WISE\u201903, San Diego, California, USA","author":"M Bohge","year":"2003","unstructured":"M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In WISE\u201903, San Diego, California, USA, September 2003."},{"key":"60_CR5","volume-title":"The Proceedings of the 8th Colloque Francophone sur l\u2019Ing\u00e9nierie des Protocoles CFIP\u20192000","author":"G Chaddoud","year":"2000","unstructured":"G. Chaddoud, I. Chrisment, and A. Schaff. Baal: S\u00e9curisation des communications de groupes dynamiques. In The Proceedings of the 8th Colloque Francophone sur l\u2019Ing\u00e9nierie des Protocoles CFIP\u20192000, Toulouse, France, October 2000."},{"key":"60_CR6","volume-title":"Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPP 2003 Workshops)","author":"T Chiang","year":"2003","unstructured":"T. Chiang and Y. Huang. Group keys and the multicast security in ad hoc networks. In Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003."},{"key":"60_CR7","volume-title":"High Performance Radio Local Area Network (Hiperlan), draft standard ETS 300652","author":"ETSI","year":"1996","unstructured":"ETSI. High Performance Radio Local Area Network (Hiperlan), draft standard ETS 300652, March 1996."},{"key":"60_CR8","series-title":"Computer Security Series","volume-title":"Multicast and Group Security","author":"T Hardjono","year":"2003","unstructured":"T. Hardjono and L. Dondeti. Multicast and Group Security. Computer Security Series. Artech House, Librarie Eyrolles, 2003."},{"key":"60_CR9","volume-title":"Etablissement de la confiance et r\u00e9seaux ad hoc \u2014 un \u00e9tat de l\u2019art","author":"V Legrand","year":"2003","unstructured":"V. Legrand, F. Abdesselam, and S. Ub\u00e9da. Etablissement de la confiance et r\u00e9seaux ad hoc \u2014 un \u00e9tat de l\u2019art. Technical report, Laboratoire CITI \u2014 INRIA ARES, 2003."},{"key":"60_CR10","volume-title":"Workshop on Mobile Ad Hoc Networking and Computing","author":"G Lin","year":"2003","unstructured":"G. Lin and G. Noubir. Secure multicast over multihop wireless ad hoc networks. In Workshop on Mobile Ad Hoc Networking and Computing, March 2003."},{"key":"60_CR11","unstructured":"C. Lindemann. \n                    http:\/\/rul-www.cs.uni-dortmund.de\n                    \n                  \/MobileP2P\/maine.html, 2003."},{"key":"60_CR12","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/263105.263179","volume-title":"SIGCOMM","author":"S Mittra","year":"1997","unstructured":"S. Mittra. Iolus: A framework for scalable secure multicasting. In SIGCOMM, pages 277\u2013288, 1997."},{"key":"60_CR13","volume-title":"Multicast Ad hoc On-Demand Distance Vector (MAODV) routing","author":"E Royer","year":"2000","unstructured":"E. Royer and C. Perkins. Multicast Ad hoc On-Demand Distance Vector (MAODV) routing, IETF Internet Draft: draft-ietf-manet-maodv-00.txt, 2000."},{"key":"60_CR14","volume-title":"GRES\u20192003 Colloque Francophone sur la Gestion de R\u00e9seaux et des Services","author":"H Sallay","year":"2003","unstructured":"H. Sallay, A. Lahmadi, O. Festor, and I. Chrisment. Extension de l\u2019architecture active amam pour le support des services de s\u00e9curit\u00e9 multicast. In GRES\u20192003 Colloque Francophone sur la Gestion de R\u00e9seaux et des Services, February 2003."},{"key":"60_CR15","first-page":"593","volume-title":"IAS TED International Conference on Parallel and Distributed Computing and Systems 2001","author":"V Varadharajan","year":"2001","unstructured":"V. Varadharajan, M. Hitchens, and R. Shankaran. Securing ntdr ad-hoc networks. In IAS TED International Conference on Parallel and Distributed Computing and Systems 2001, pages 593\u2013598, Anaheim California, August 2001."},{"key":"60_CR16","volume-title":"Key management for heterogeneous ad hoc wireless networks","author":"S Yi","year":"2002","unstructured":"S. Yi and R. Kravets. Key management for heterogeneous ad hoc wireless networks. Report Research UIUCDCS-R-2002\u20132290, UILU-ENG-2002\u20131734, University of Illinois at Urbana-Champaign, Department of Computer Science, 1304 West Springfield Avenue, Urbana, IL 61801\u20132987 USA, July 2002."},{"issue":"6","key":"60_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L Zhou","year":"1999","unstructured":"L. Zhou and J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24\u201330, 1999.","journal-title":"IEEE Network"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:04:02Z","timestamp":1620011042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}