{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:45:41Z","timestamp":1725529541746},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_5","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T11:22:23Z","timestamp":1237288943000},"page":"66-83","source":"Crossref","is-referenced-by-count":1,"title":["Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks"],"prefix":"10.1007","author":[{"given":"Jihye","family":"Kim","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Amir, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., Kim, Y., Tsudik, G.: Exploring robustness in group key agreement. In: ICDCS, pp. 399\u2013408 (2001)","DOI":"10.1109\/ICDSC.2001.918970"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group diffie-hellman key exchange - the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 290. Springer, Heidelberg (2001)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. In: ACM CCS (November 2001)","DOI":"10.1145\/501983.502018"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Cachin, C., Strobl, R.: Asynchronous group key exchange with failures. In: PODC, pp. 357\u2013366 (2004)","DOI":"10.1145\/1011767.1011820"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/90.650139","volume":"5","author":"S. Floyd","year":"1997","unstructured":"Floyd, S., Jacobson, V., Liu, C., McCanne, S., Zhang, L.: A reliable multicast framework for light-weight sessions and application level framing. IEEE\/ACM ToN\u00a05(6), 784\u2013803 (1997)","journal-title":"IEEE\/ACM ToN"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Kim, J., Tsudik, G.: Robust group key agreement using short broadcasts. In: ACM CCS, pp. 411\u2013420 (2007)","DOI":"10.1145\/1315245.1315296"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00145-006-0361-5","volume":"20","author":"J. Katz","year":"2007","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. Journal of Cryptology\u00a020(1), 85\u2013113 (2007)","journal-title":"Journal of Cryptology"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: ACM Conference on Computer and Communications Security, pp. 235\u2013244 (2000)","DOI":"10.1145\/352600.352638"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE ToC\u00a033(7) (2004)","DOI":"10.1109\/TC.2004.31"},{"key":"5_CR11","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Moser, L., Amir, Y., Melliar-Smith, P., Agarwal, D.: Extended virtual synchrony. In: ICDCS, pp. 56\u201365 (1994)","DOI":"10.1109\/ICDCS.1994.302392"},{"issue":"3","key":"5_CR13","first-page":"407","volume":"15","author":"S. Paul","year":"1997","unstructured":"Paul, S., Sabnani, K., Lin, J., Bhattacharya, S.: Reliable multicast transport protocol (rmtp). IEEE JSAC\u00a015(3), 407\u2013421 (1997)","journal-title":"IEEE JSAC"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/0-387-34799-2_37","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D.G. Steer","year":"1990","unstructured":"Steer, D.G., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 520\u2013528. Springer, Heidelberg (1990)"},{"issue":"8","key":"5_CR15","first-page":"769","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE TPDS\u00a011(8), 769\u2013780 (2000)","journal-title":"IEEE TPDS"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T21:28:08Z","timestamp":1558214888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}