{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:23:51Z","timestamp":1743013431038,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540723820"},{"type":"electronic","value":"9783540723837"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72383-7_122","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T14:47:40Z","timestamp":1184597260000},"page":"1045-1053","source":"Crossref","is-referenced-by-count":0,"title":["An Improvement of Park-Chung-Cho\u2019s Stream Authentication Scheme by Using Information Dispersal Algorithm"],"prefix":"10.1007","author":[{"given":"Seok-Lae","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yongsu","family":"Park","sequence":"additional","affiliation":[]},{"given":"Joo-Seok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"122_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-0190(02)00456-8","volume":"86","author":"Y. Park","year":"2003","unstructured":"Park, Y., Chung, T., Cho, Y.: An efficient Stream Authentication Scheme Using Tree Chaining. Information Processing Letters\u00a086(1), 1\u20138 (2003)","journal-title":"Information Processing Letters"},{"key":"122_CR2","unstructured":"Park, J., Chong, E., Siegel, H.: Efficient Multicast Packet Authentication Using Signature Amortization. In: Proceedings of IEEE Security and Privacy Symposium, pp. 227\u2013240 (2002)"},{"key":"122_CR3","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of IEEE Security and Privacy Symposium (2000)"},{"issue":"2","key":"122_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"O.R. Michael","year":"1989","unstructured":"Michael, O.R.: Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance. Journal of the Association for Computing Machinery\u00a036(2), 335\u2013348 (1989)","journal-title":"Journal of the Association for Computing Machinery"},{"key":"122_CR5","unstructured":"Philippe, G., Nagendra, M.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS\u201901, pp. 13\u201322 (2001)"},{"key":"122_CR6","unstructured":"Sara, M., Jessica, S.: Graph-Based Authentication of Digital Streams. In: Proceedings of IEEE Security and Privacy Symposium, pp. 232\u2013246 (2001)"},{"key":"122_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"122_CR8","volume-title":"Probability, Random Variables and Random Signal Principles","author":"P.Z. Peebles","year":"2001","unstructured":"Peebles, P.Z.: Probability, Random Variables and Random Signal Principles. McGraw-Hill International, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72383-7_122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T20:27:06Z","timestamp":1558470426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72383-7_122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540723820","9783540723837"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72383-7_122","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}