{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:04Z","timestamp":1725702184469},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_14","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T08:08:15Z","timestamp":1347264495000},"page":"135-146","source":"Crossref","is-referenced-by-count":0,"title":["Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree"],"prefix":"10.1007","author":[{"given":"B. R.","family":"Purushothama","sequence":"first","affiliation":[]},{"given":"Kusuma","family":"Shirisha","sequence":"additional","affiliation":[]},{"given":"B. B.","family":"Amberker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Aparna, A., Amberker, B.B.: Secure group communication using binomial trees. In: Third International Symposium on Advanced Networks and Telecommunication Systems, IEEE ANTS (2009)","DOI":"10.1109\/ANTS.2009.5409894"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using key Graphs. IEEE\/ACM Transactions on Networking\u00a08, 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for Scalable Secure Multicasting. In: ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, vol.\u00a027, pp. 277\u2013288 (1997)","DOI":"10.1145\/263109.263179"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TPDS.2004.1278104","volume":"15","author":"Y. Amir","year":"2004","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., Tsudik, G.: Secure Group Communication using Robust Contributory Key Agreement. IEEE Transactions on Parallel and Distributed System\u00a015, 468\u2013480 (2004)","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys\u00a035, 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Purushothama, B.R., Amberker, B.B.: Group key management scheme for simultaneous multiple groups with overlapped membership. In: Third International Conference on Communication Systems and Networks, COMSNETS, pp. 1\u201310 (2011)","DOI":"10.1109\/COMSNETS.2011.5716429"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Aparna, A., Amberker, B.B.: Key Management Scheme for Multiple Simultaneous Secure Group Communication. In: IEEE International Conference on Internet Multimedia Systems Architecture and Applications, IMSAA 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/IMSAA.2009.5439485"},{"key":"14_CR10","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2006","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. PHI Publishers, New Delhi (2006)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1002\/nem.742","volume":"20","author":"A. Aparna","year":"2010","unstructured":"Aparna, A., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. International Journal of Network Management\u00a020, 383\u2013418 (2010)","journal-title":"International Journal of Network Management"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:45:43Z","timestamp":1620117943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}