{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:56:27Z","timestamp":1772063787702,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642346002","type":"print"},{"value":"9783642346019","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_27","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"361-372","source":"Crossref","is-referenced-by-count":3,"title":["A Communication Efficient Group Key Distribution Scheme for MANETs"],"prefix":"10.1007","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"27_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of Ninth International Conference on Network Protocols, pp. 251\u2013260 (2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Saxena, N., Yi, J.H.: An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 1\u20139 (2004)","DOI":"10.1145\/1029102.1029105"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in P2P and MANETs: the case of membership control. In: Proceedings of 11th IEEE International Conference on Network Protocols, pp. 336\u2013345 (2003)","DOI":"10.1109\/ICNP.2003.1249783"},{"key":"27_CR5","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of 11th IEEE International Conference on Network Protocols, pp. 326\u2013335 (2003)"},{"issue":"6","key":"27_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proceedings of 3rd ACM Conference on Computer and Communications Security, pp. 31\u201337 (1996)","DOI":"10.1145\/238168.238182"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A New Approach to Group Key Agreement. In: IEEE, Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380\u2013387 (1998)","DOI":"10.1109\/ICDCS.1998.679745"},{"issue":"8","key":"27_CR9","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2002","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems\u00a011(8), 769\u2013780 (2002)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"27_CR10","unstructured":"Perrig, A.: Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication. In: International Workshop on Cryptographic Techniques and E-Commerce, pp. 192\u2013202 (1999)"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y. Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Transactions on Information and System Security\u00a07(1), 60\u201396 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/iet-ifs:20060142","volume":"2","author":"G.P. Biswas","year":"2008","unstructured":"Biswas, G.P.: Diffie-Hellman Technique: Extended to Multiple Two-party Keys and One Multi-party Key. Information Security, IET\u00a02(1), 12\u201318 (2008)","journal-title":"Information Security, IET"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/978-3-642-10433-6_33","volume-title":"Cryptology and Network Security","author":"T. Brecher","year":"2009","unstructured":"Brecher, T., Bresson, E., Manulis, M.: Fully Robust Tree-Diffie-Hellman Group Key Exchange. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 478\u2013497. Springer, Heidelberg (2009)"},{"issue":"2","key":"27_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.15388\/Informatica.2010.286","volume":"21","author":"Y.M. Tseng","year":"2010","unstructured":"Tseng, Y.M., Wu, T.Y.: Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique. Informatica\u00a021(2), 247\u2013258 (2010)","journal-title":"Informatica"},{"key":"27_CR15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.26636\/jtit.2006.1.361","volume":"1","author":"C.Y. Ng","year":"2006","unstructured":"Ng, C.Y., Mu, Y., Susilo, W.: An Identity-based Broadcast Encryption Scheme for Mobile Ad Hoc Networks. Journal of Telecommunications and Information Technology\u00a01, 24\u201329 (2006)","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R. Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology. Journal of the ACM\u00a051, 557\u2013594 (2004)","journal-title":"Journal of the ACM"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-24676-3_11","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Boldyreva, A., Palacio, A.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 171\u2013188. Springer, Heidelberg (2004)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, L., Hu, Y., Mu, N.: An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. In: Proceedings of the 9th International Conference for Young Computer Scientists, pp. 1619\u20131623 (2008)","DOI":"10.1109\/ICYCS.2008.194"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil pairing. SIAM Journal on Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Practical Identity-Based Encryption without random oracles. In: Proceedings of 25th Annual International Cryptology Conference, pp. 445\u2013464 (2006)","DOI":"10.1007\/11761679_27"},{"key":"27_CR21","unstructured":"Lynn B.: The PBC library, http:\/\/crypto.stanford.edu\/pbc\/"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:42:28Z","timestamp":1745196148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}