{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T19:40:36Z","timestamp":1740253236129,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_75","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T21:26:19Z","timestamp":1278537979000},"page":"662-672","source":"Crossref","is-referenced-by-count":1,"title":["Scalable Group Key Management with Partially Trusted Controllers"],"prefix":"10.1007","author":[{"given":"Himanshu","family":"Khurana","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Bonilla","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[]},{"given":"Raja","family":"Afandi","sequence":"additional","affiliation":[]},{"given":"Hyung-Seok","family":"Hahm","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","unstructured":"Adamson, B., Bormann, C., Handley, M., Macker, J.: NACK-Oriented Reliable Multicast Protocol (NORM)., RMT Working Group INTERNET-DRAFT, draft-ietf-rmt-pi-norm-09 (January 2004)"},{"issue":"2","key":"75_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/312203.312207","volume":"17","author":"K.P. Birman","year":"1999","unstructured":"Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal Multicast. ACM Transactions on Computer Systems\u00a017(2), 41\u201388 (1999)","journal-title":"ACM Transactions on Computer Systems"},{"key":"75_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"75_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"75_CR5","volume-title":"Proceedings of the 7th Workshop Enabling Technologies","author":"G. Caronni","year":"1998","unstructured":"Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic groups. In: Proceedings of the 7th Workshop Enabling Technologies, Cupertino, CA, IEEE Comp. Soc. Press, Los Alamitos (1998)"},{"key":"75_CR6","unstructured":"CERT E-crime Watch Survey. Carnegie Mellon Software Engineering Institute (May 2004), http:\/\/www.cert.org\/about\/ecrime.html"},{"issue":"4","key":"75_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T.E. Gamal","year":"1985","unstructured":"Gamal, T.E.: A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm. IEEE Transactions of Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions of Information Theory"},{"key":"75_CR8","unstructured":"Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (February 2003)"},{"key":"75_CR9","doi-asserted-by":"crossref","unstructured":"H. Khurana et al., Scalable Group Key Management with Partially Trusted Controllers (full length manuscript) (November 2004), available at http:\/\/www.ncsa.uiuc.edu\/people\/hkhurana","DOI":"10.1007\/978-3-540-31957-3_75"},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of 7th ACM Conference on Computer and Communication Security, CCS (2000)","DOI":"10.1145\/352600.352638"},{"key":"75_CR11","unstructured":"Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Transactions on Fundamentals\u00a0E80-A(1) (1997)"},{"key":"75_CR12","unstructured":"Moyer, M., Rao, J., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast., draft-irtf-smug-key-tree-balance-00.txt, IETF Secure Multicast Group (June 1999)"},{"issue":"3","key":"75_CR13","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys\u00a035(3), 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"issue":"9","key":"75_CR14","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1002\/(SICI)1097-024X(19980725)28:9<963::AID-SPE179>3.0.CO;2-9","volume":"28","author":"R.V. Renesse","year":"1998","unstructured":"Renesse, R.V., Birman, K.P., Hayden, M., Vaysburd, A.: Building adaptive systems using ensemble. Software\u2013Practice and Experience\u00a028(9), 963\u2013979 (1998)","journal-title":"Software\u2013Practice and Experience"},{"key":"75_CR15","doi-asserted-by":"crossref","unstructured":"Rodeh, O., Birman, K., Dolev, D.: The Architecture and Performance of the Security Protocols in the Ensemble Group Communication System. Journal of ACM Transactions on Information Systems and Security, TISSEC (2001)","DOI":"10.1145\/501978.501982"},{"key":"75_CR16","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group ReKeying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 215\u2013228 (2000)","DOI":"10.1109\/SECPRI.2000.848459"},{"key":"75_CR17","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (August 2000)","DOI":"10.1109\/71.877936"},{"key":"75_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1007\/0-387-34799-2_37","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Steer","year":"1990","unstructured":"Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 520\u2013528. Springer, Heidelberg (1990)"},{"issue":"9","key":"75_CR19","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M. Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications\u00a017(9), 1614\u20131631 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"75_CR20","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures., Internet-draft (September 1998)","DOI":"10.17487\/rfc2627"},{"issue":"1","key":"75_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"6","key":"75_CR22","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/TNET.2003.820256","volume":"11","author":"X.B. Zhang","year":"2003","unstructured":"Zhang, X.B., Lam, S.S., Lee, D.-Y., Yang, Y.R.: Protocol design for scalable and reliable group rekeying. IEEE\/ACM Transactions on Networking\u00a011(6), 908\u2013922 (2003)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"75_CR23","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes for Secure Multicast. In: Proc.of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003) (May 2003)"},{"key":"75_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. In: Proc. of Networked Group Communication Conference (2003)","DOI":"10.1007\/978-3-540-39405-1_10"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_75.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T19:19:45Z","timestamp":1740251985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_75","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}