{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:20:06Z","timestamp":1740028806443,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_54","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"337-341","source":"Crossref","is-referenced-by-count":0,"title":["Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks"],"prefix":"10.1007","author":[{"given":"Devaraju Suganya","family":"Devi","sequence":"first","affiliation":[]},{"given":"Ganapathi","family":"Padmavathi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","first-page":"385","volume-title":"Proc. IEEE International Conference on Parallel Processing","author":"T. Chiang","year":"2003","unstructured":"Chiang, T., Huang, Y.: Group keys and the multicast security in adhoc networks. In: Proc. IEEE International Conference on Parallel Processing, October 2003, pp. 385\u2013390. IEEE press, Los Alamitos (2003)"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Lazos, L., Poovendram, R.: Energy-Aware Secure Multicast Communication in AdHoc Networks Using Geographical Location Information. In: Proc.IEEE International Conference on Acoustics Speech and Signal Processing, April 2003, pp. 201\u2013204 (2003)","DOI":"10.1109\/ICASSP.2003.1202593"},{"key":"54_CR3","unstructured":"Dondeti, L., Mukherjee, S., Samal, A.: Secure one-to many group communication sing dual encryption. In: IEEE sym. on Computers and Communications, July 1999, pp. 1\u201325 (1999)"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Bettahar, H., Bouabdallah, A., Challal, Y.: An adaptive key management protocol for secure multicast. In: Proc. IEEE International Conference on Computer Communications and Networks, October 2002, pp. 190\u2013195 (2002)","DOI":"10.1109\/ICCCN.2002.1043065"},{"key":"54_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/978-3-540-24693-0_60","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"M. Bouassida","year":"2004","unstructured":"Bouassida, M., Chrisment, I., Festor, O.: An Enhanced Hybrid Key Management Protocol for Secure Multicast in AdHoc Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 725\u2013742. Springer, Heidelberg (2004)"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for scalable secure multicasting. In: SIGCOMM, pp. 277\u2013288 (1997)","DOI":"10.1145\/263105.263179"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications. ACM SIGCOMM Computer Communication Review, 55\u201370 (April 2004)","DOI":"10.1145\/997150.997157"},{"key":"54_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/11422778_12","volume-title":"NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems","author":"M. Bouassida","year":"2005","unstructured":"Bouassida, M., Chrisment, I., Festor, O.: Efficient Clustering for Multicast Key Distribution in MANETs. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S., Black, J.P. (eds.) NETWORKING 2005. LNCS, vol.\u00a03462, pp. 138\u2013153. Springer, Heidelberg (2005)"},{"key":"54_CR9","unstructured":"Bouassida, M., Chrisment, I., Festor, O.: Group Key Management in Manets. International Journal of Network Security, 67\u201379 (January 2008)"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Bouassida, M., Chrisment, I., Festor, O.: Efficient group key management protocol in MANETs using multipoint relaying technique. In: Proc. IEEE International Conference on Networking, April 2006, p. 64 (2006)","DOI":"10.1109\/ICNICONSMCL.2006.84"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:10:50Z","timestamp":1739995850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}