{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:29:17Z","timestamp":1737437357790,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747833"},{"type":"electronic","value":"9783540747840"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74784-0_30","type":"book-chapter","created":{"date-parts":[[2007,9,18]],"date-time":"2007-09-18T02:29:19Z","timestamp":1190082559000},"page":"287-295","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Group Key Management Based on Jacobian Elliptic Chebyshev Rational Map"],"prefix":"10.1007","author":[{"given":"Qin","family":"Ke","sequence":"first","affiliation":[]},{"given":"Zhou","family":"Mingtian","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Naiqi","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yujie","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Jiandong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ballardie, A.: Scalable multicast key distribution. RFC1949 (1996)","key":"30_CR1","DOI":"10.17487\/rfc1949"},{"doi-asserted-by":"crossref","unstructured":"Hardjono, T.: Verisign. The Multicast Group Security Architecture. RFC3740 (2004)","key":"30_CR2","DOI":"10.17487\/rfc3740"},{"doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures RFC2627 (June 1999)","key":"30_CR3","DOI":"10.17487\/rfc2627"},{"unstructured":"Du, F., Ni, L.M., Esfahanian, A.-H.: Toward Solving Multicast Key Management Problem. Computer Communications and Networks, 232\u2013236 (1999)","key":"30_CR4"},{"issue":"3","key":"30_CR5","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys\u00a035(3), 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"doi-asserted-by":"crossref","unstructured":"Duma, C., Shahmehri, N., Lambrix, P.: A Hybrid Key Tree scheme for Multicast to Balance Security and Efficiency Requirements. In: Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 378\u2013383 (2003)","key":"30_CR6","DOI":"10.1109\/ENABL.2003.1231409"},{"issue":"4","key":"30_CR7","first-page":"128","volume":"6","author":"J. Pegueroles","year":"2003","unstructured":"Pegueroles, J., Rico-Novella, F.: Reducing Latency in Multicast Group Re-keying using Eulers Theorem. IEEE Communication letters\u00a06(4), 128\u2013133 (2003)","journal-title":"IEEE Communication letters"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","first-page":"456","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"R. Canneti","year":"1999","unstructured":"Canneti, R.: Efficient Communication-Storage Tradeoffs For multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 456\u2013477. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Li, M., Poovendran, R., Berenstein, C.: Design of Secure Multicast Key Management Schemes With Communication Budget Constraint. IEEE Communications Letters\u00a06(3) (March 2002)","key":"30_CR9","DOI":"10.1109\/4234.991148"},{"key":"30_CR10","first-page":"28","volume":"3","author":"L. Kocarev","year":"2003","unstructured":"Kocarev, L., Tasev, Z.: Public-Key Encryption Based On Chebyshev Mnnaps. Circuits and Systems (ISCAS 2003)\u00a03, 28\u201331 (2003)","journal-title":"Circuits and Systems (ISCAS 2003)"},{"issue":"1","key":"30_CR11","first-page":"122","volume":"26","author":"Z. Hong","year":"1998","unstructured":"Hong, Z., Jun, Y., Xie-Ting, L.: Design of chaotic feed forward stream cipher. Acta Electronica Sinica\u00a026(1), 122\u2013126 (1998)","journal-title":"Acta Electronica Sinica"},{"unstructured":"Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. arXiv:nlin. CD\/0412023, 9 (December 2004)","key":"30_CR12"},{"unstructured":"Bergamo, P., D\u2019Arco, P., Santis, A., Kocarev, L.: Security of Public Key Cryptosystems based on Chebyshev Polynomials. arXiv:cs.CR\/0411030, vol. 10 (November 2004)","key":"30_CR13"},{"key":"30_CR14","first-page":"31","volume-title":"Proceedings of the 3rd ACM conference on Computer and communications security","author":"M. Steiner","year":"1996","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended To Group Communication. In: Proceedings of the 3rd ACM conference on Computer and communications security, New Delhi, India, pp. 31\u201337. ACM Press, New York (1996)"},{"issue":"3","key":"30_CR15","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1145\/1015040.1015045","volume":"7","author":"Y. Amir","year":"2004","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On The Performance of Group Key Agreement Protocols. ACM Transactions on Information and System Security\u00a07(3), 457\u2013488 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"30_CR16","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/996943.996946","volume":"7","author":"W. Aiello","year":"2004","unstructured":"Aiello, W., Bellovin, S.M., Mattblaze: Just Fast Keying: Key Agreement in a Hostile Internet. ACM Transactions on Information and System Security\u00a07(2), 242\u2013273 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"30_CR17","first-page":"81","volume":"2","author":"T. Yang","year":"2004","unstructured":"Yang, T.: A survey of chaotic secure communication systems. International Journal of Computational Cognition\u00a02(2), 81\u2013130 (2004)","journal-title":"International Journal of Computational Cognition"},{"doi-asserted-by":"crossref","unstructured":"McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees, 29(5), 444\u2013458. IEEE Computer Society, Los Alamitos (2003)","key":"30_CR18","DOI":"10.1109\/TSE.2003.1199073"},{"unstructured":"Ku, W.-C., Chen, S.-M.: An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 245\u2013251 (2003)","key":"30_CR19"},{"doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: ACM CCS 2000. Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 235\u2013244 (November 2000)","key":"30_CR20","DOI":"10.1145\/352600.352638"},{"unstructured":"Abramowitz, M., Stegun, I.A.: Handbook of Mathematical Functions. Dover Publications (1970)","key":"30_CR21"},{"doi-asserted-by":"crossref","unstructured":"Wachspress, E.L.: Evaluating Elliptic Functions and Their Inverses. Computers and Mathematics with Applications\u00a0(39), 230\u2013236 (2000)","key":"30_CR22","DOI":"10.1016\/S0898-1221(99)00339-9"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.cam.2004.05.001","volume":"174","author":"B.C. Carlson","year":"2005","unstructured":"Carlson, B.C.: Jacobian elliptic functions as inverses of an integral. Journal of Computational and Applied Mathematics\u00a0174, 355\u2013359 (2005)","journal-title":"Journal of Computational and Applied Mathematics"},{"doi-asserted-by":"crossref","unstructured":"Kato, A., Kohda, T.: Solvable 2-dimensional Rational Chaotic Map Defined by Jacobian Elliptic Functions. Circuits and Systems, 1477\u20131480 (2005)","key":"30_CR24","DOI":"10.1109\/ISCAS.2005.1464878"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/S0167-2789(00)00184-6","volume":"148","author":"T. Kohda","year":"2001","unstructured":"Kohda, T., Fujisaki, H.: Jacobian elliptic Chebyshev rational maps. Physica D\u00a0148, 242\u2013254 (2001)","journal-title":"Physica D"},{"issue":"10","key":"30_CR26","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1109\/81.633885","volume":"44","author":"M. Gotz","year":"1997","unstructured":"Gotz, M., Kelber, K., Schwarz, W.: Discrete-Time Chaotic Encryption Systems Part I: Statistical Design Approach. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications\u00a044(10), 963\u2013970 (1997)","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"doi-asserted-by":"crossref","unstructured":"Nam, J., Lee, J., Kim, S., Won, D.: DDH-based group key agreement in a mobile environment. The Journal of Systems and Software, 73\u201383 (2005)","key":"30_CR27","DOI":"10.1016\/j.jss.2004.10.024"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74784-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T01:18:20Z","timestamp":1737422300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74784-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747833","9783540747840"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74784-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}