{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:52:14Z","timestamp":1725558734828},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_16","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T15:33:06Z","timestamp":1277825586000},"page":"189-202","source":"Crossref","is-referenced-by-count":2,"title":["Modeling Protocols for Secure Group Communications in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Alec","family":"Yasinsac","sequence":"first","affiliation":[]},{"given":"James A.","family":"Davis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM CCS ACM (November 1998)","DOI":"10.1145\/288090.288097"},{"key":"16_CR2","first-page":"325","volume-title":"Proc of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge","author":"M. Burrows","year":"1988","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A Practical Study in Belief and Action. In: Vardi, M. (ed.) Proc of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge, Asilomar, Ca., February 1988, pp. 325\u2013342. Morgan Kaufmann, Los Altos (1988)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cheriton, D.R., Deering, S.E.: Host Groups: A Multicast Extension for Datagram Internetworks. In: 9th Data Communication Symposium (September 1985)","DOI":"10.1145\/319056.319039"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE Infocom (March 1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"16_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorshot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Codes and Cryptography"},{"key":"16_CR7","unstructured":"Fischer, M., Wright, R.N.: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. In: Proc of the 4th Symp on Discrete Algorithms, pp. 475\u2013483 (1993)"},{"key":"16_CR8","unstructured":"Hardjono, T., Cain, B., Dorawswamy, N.: A framework for group key management for multicast security, IETF Internet draft (August 2000), draft-ietf-ipsecgkmframework-03.txt"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Harn, L., Kiesler, T.: Authenticated Group Key Distribution Scheme For a Large Distributed Network. In: IEEE Symposium on Security and Privacy, pp. 300\u2013309 (1989)","DOI":"10.1109\/SECPRI.1989.36304"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Meadows, C.: A System for the Specification and Analysis of Key Management Protocols. In: IEEE Computer Society Symp on Research in Security and Privacy, pp. 182\u2013195 (1991)","DOI":"10.1109\/RISP.1991.130786"},{"key":"16_CR11","unstructured":"Meadows, C., Narendran, P.: A Unification Algorithm for the Group Diffie- Hellman Protocol. In: WITS (in conjunction with POPL 2002), Portland, Oregon, USA (January 14-15, 2002)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. In: IEEE Network, November\/December 1999, pp. 12\u201323 (1999)","DOI":"10.1109\/65.806981"},{"issue":"12","key":"16_CR13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. CACM\u00a021(12), 993\u2013999 (1978)","journal-title":"CACM"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340719","volume":"3","author":"M. Ramalho","year":"2000","unstructured":"Ramalho, M.: Intra and inter-domain multicast routing protocols: A survey and a taxonomy. IEEE Communications Surveys & Tutorials\u00a03(1), 2\u201325 (2000)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"16_CR15","unstructured":"Reiter, M.: A secure group membership protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1994)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Shields, C., Garcia-Luna-Aceves, J.J.: KHIP\u2014A scalable protocol for secure multicast routing. In: ACM SIGCOMM (1999)","DOI":"10.1145\/316188.316206"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proc. 3rd ACM CCS, New Dehli, India, May 14-16, pp. 31\u201337 (1996)","DOI":"10.1145\/238168.238182"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:00:32Z","timestamp":1559214032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}