{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:12:53Z","timestamp":1762521173065},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747413"},{"type":"electronic","value":"9783540747420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74742-0_39","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T07:03:30Z","timestamp":1187679810000},"page":"419-430","source":"Crossref","is-referenced-by-count":8,"title":["Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability"],"prefix":"10.1007","author":[{"given":"Ratna","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/B:DESI.0000029210.20690.3f","volume":"32","author":"C. Blundo","year":"2004","unstructured":"Blundo, C., D\u2019Arco, P., Santis, A., Listo, M.: Design of Self-healing Key Distribution Schemes. Design Codes and Cryptology\u00a032, 15\u201344 (2004)","journal-title":"Design Codes and Cryptology"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/978-3-540-27836-8_22","volume-title":"Automata, Languages and Programming","author":"C. Blundo","year":"2004","unstructured":"Blundo, C., D\u2019Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Self-healing Key Distribution. In: D\u00edaz, J., Karhum\u00e4ki, J., Lepist\u00f6, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol.\u00a03142, pp. 234\u2013245. Springer, Heidelberg (2004)"},{"key":"39_CR3","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/LCOMM.2005.1496607","volume":"9","author":"D. Hong","year":"2005","unstructured":"Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Self-healing Property. IEEE Communication Letters 2005\u00a09, 759\u2013761 (2005)","journal-title":"IEEE Communication Letters 2005"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Sun, K.: Efficient Self-healing Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM CCS 2003, pp. 27\u201331 (2003)","DOI":"10.1145\/948109.948141"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"More, S., Malkin, M., Staddon, J.: Sliding-window Self-healing Key Distribution with Revocation. In: ACM Workshop on Survivable and Self-regenerative Systems 2003, pp. 82\u201390 (2003)","DOI":"10.1145\/1036921.1036930"},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/11586821_23","volume-title":"Cryptography and Coding 2004","author":"G. Saez","year":"2005","unstructured":"Saez, G.: On Threshold Self-healing Key Distribution Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2004. LNCS, vol.\u00a03796, pp. 340\u2013354. Springer, Heidelberg (2005)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy 2002, pp. 224\u2013240 (2002)","DOI":"10.1109\/SECPRI.2002.1004375"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74742-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T05:31:39Z","timestamp":1556775099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74742-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747413","9783540747420"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74742-0_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}