{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:44Z","timestamp":1742912984073,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200505"},{"type":"electronic","value":"9783540394044"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39404-4_5","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:04:45Z","timestamp":1277697885000},"page":"64-77","source":"Crossref","is-referenced-by-count":2,"title":["MAFIA: A Multicast Management Solution for Access Control and Traffic Filtering"],"prefix":"10.1007","author":[{"given":"Krishna N.","family":"Ramachandran","sequence":"first","affiliation":[]},{"given":"Kevin C.","family":"Almeroth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Sarac, K., Almeroth, K.: Supporting Multicast Deployment Efforts: A Survey of Tools for Multicast Monitoring. Journal of High Speed Networking\u2013Special Issue on Management of Multimedia Networking (March 2001)"},{"key":"5_CR2","unstructured":"Rajvaidya, P., Ramachandran, K., Almeroth, K.: Detection and Deflection of Denial of Service Attacks against the Multicast Source Discovery Protocol. UCSB Technical Report (May 2003)"},{"issue":"5-6","key":"5_CR3","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/S0140-3664(00)00296-6","volume":"24","author":"E. Al-Shaer","year":"2001","unstructured":"Al-Shaer, E., Tang, Y.: Toward integrating IP multicasting in internet network management protocols. Computer Communications\u00a024(5-6), 473\u2013485 (2001)","journal-title":"Computer Communications"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.: Secure group communications using key graphs. In: ACM SIGCOMM, pp. 68\u201379 (1998)","DOI":"10.1145\/285237.285260"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: IEEE Infocomm 1999, pp. 689\u2013698 (1999)","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Djahandari, K., Sterne, D.: An MBone proxy for an application gateway firewall. IEEE Symposium on Security and Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601318"},{"key":"5_CR7","unstructured":"Finlayson, R.: The UDP Multicast Tunneling Protocol. Internet Engineering Task Force (IETF), draft-finlayson-umtp-*.txt (September 2002)"},{"key":"5_CR8","unstructured":"Chouinard, D.: SOCKS V5 UDP and Multicast Extensions to facilitate multicast firewall traversal. Internet Engineering Task Force (IETF), draft-ietf-aft-mcast-fwtraversal-*.txt (November 1997)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Hardjono, T., Tsudik, G.: IP multicast security: Issues and directions. Annales de Telecom (2000)","DOI":"10.1007\/BF02994841"},{"key":"5_CR10","unstructured":"IP Security Protocol (ipsec), http:\/\/www.ietf.org\/html.charters\/ipsec-charter.html"},{"key":"5_CR11","unstructured":"Spoofed IGMP Report Denial of Service Vulnerability, http:\/\/online.securityfocus.com\/bid\/5020\/info"},{"key":"5_CR12","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. IEEE Symposium on Security and Privacy (May 2002)"}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39404-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T07:06:12Z","timestamp":1635577572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39404-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200505","9783540394044"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39404-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}