{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:03:47Z","timestamp":1725739427886},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379482"},{"type":"electronic","value":"9783642379499"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37949-9_76","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T07:42:10Z","timestamp":1372923730000},"page":"879-893","source":"Crossref","is-referenced-by-count":1,"title":["Security Improvement in Group Key Management"],"prefix":"10.1007","author":[{"given":"Manisha","family":"Manjul","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rajesh","family":"Mishra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"76_CR1","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.comcom.2009.08.007","volume":"33","author":"D.-H. Je","year":"2010","unstructured":"Je, D.-H., Lee, J.-S., Park, Y., Seo, S.-W.: Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications 33(2), 136\u2013148 (2010)","journal-title":"Computer Communications"},{"issue":"17","key":"76_CR2","doi-asserted-by":"publisher","first-page":"4727","DOI":"10.1016\/j.comnet.2007.07.007","volume":"51","author":"A.N. Pour","year":"2007","unstructured":"Pour, A.N., Kumekawa, K., Kato, T., Itoh, S.: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Elsevier, Computer Networks\u00a051(17), 4727\u20134743 (2007)","journal-title":"Elsevier, Computer Networks"},{"issue":"3","key":"76_CR3","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2006.11.001","volume":"26","author":"X. Chen","year":"2007","unstructured":"Chen, X., Ma, B.N.W., Yang, C.: M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Computers & Security\u00a026(3), 238\u2013245 (2007)","journal-title":"Computers & Security"},{"key":"76_CR4","doi-asserted-by":"crossref","unstructured":"Sun, Y(L.), Ray Liu, K.J.: Hierarchical Group Access Control for Secure Multicast Communications. IEEE\/ACM Transactions on Networking\u00a015(6) (December 2007)","DOI":"10.1109\/TNET.2007.897955"},{"key":"76_CR5","doi-asserted-by":"crossref","unstructured":"Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups. IEEE\/ACM Transactions on Networking\u00a014(2) (April 2006)","DOI":"10.1109\/TNET.2006.872575"},{"issue":"1","key":"76_CR6","first-page":"13","volume":"12","author":"R. Abdellatif","year":"2011","unstructured":"Abdellatif, R., Aslan, H.K., Elramly, S.H.: New Real Time Multicast Authentication Protocol. International Journal of Network Security\u00a012(1), 13\u201320 (2011)","journal-title":"International Journal of Network Security"},{"issue":"1","key":"76_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comnet.2006.03.008","volume":"51","author":"S. Zheng","year":"2007","unstructured":"Zheng, S., Manz, D., Alves-Foss, J.: A communication computation efficient group key algorithm for large and dynamic groups. Elsevier, Computer Networks\u00a051(1), 69\u201393 (2007)","journal-title":"Elsevier, Computer Networks"},{"key":"76_CR8","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999), RFC 2627","DOI":"10.17487\/rfc2627"},{"issue":"2","key":"76_CR9","first-page":"61","volume":"12","author":"I.A. Saroit","year":"2011","unstructured":"Saroit, I.A., El-Zoghdy, S.F., Matar, M.: A Scalable and Distributed Security Protocol for Multicast Communications. International Journal of Network Security\u00a012(2), 61\u201374 (2011)","journal-title":"International Journal of Network Security"},{"key":"76_CR10","doi-asserted-by":"crossref","unstructured":"Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: Multicast Security (MSEC) Group Key Management Architecture. RFC 4046 (April 2005)","DOI":"10.17487\/rfc4046"},{"issue":"1","key":"76_CR11","first-page":"1305","volume":"2","author":"Y. Challal","year":"2005","unstructured":"Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology\u00a02(1) (2005) Issn: 1305-2403","journal-title":"International Journal of Information Technology"},{"key":"76_CR12","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE\/ACM Transactions on Networking\u00a08(1) (February 2000)","DOI":"10.1109\/90.836475"},{"key":"76_CR13","unstructured":"Jabeenbegum, S., Purusothaman, T., Karthi, M., Balachandar, N., Arunkumar, N.: An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks. IJCSNS International Journal of Computer Science and Network Security\u00a010(2) (February 2010)"},{"issue":"1","key":"76_CR14","first-page":"33","volume":"11","author":"R. Srinivasan","year":"2010","unstructured":"Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Chidambaram Kalimuthu, R., Dharmaraj, R.: Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security\u00a011(1), 33\u201338 (2010)","journal-title":"International Journal of Network Security"},{"key":"76_CR15","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1109\/TC.2007.1022","volume":"56","author":"W.H.D. Ng","year":"2007","unstructured":"Ng, W.H.D., Howarth, M., Sun, Z., Cruickshank, H.: Dynamic Balanced Key Tree Management for Secure Multicast Communications. IEEE Transactions on Computers\u00a056, 590\u2013605 (2007)","journal-title":"IEEE Transactions on Computers"},{"key":"76_CR16","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TC.2005.15","volume":"54","author":"H. Lu","year":"2005","unstructured":"Lu, H.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Transactions on Computers\u00a054, 214\u2013224 (2005)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"76_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"76_CR18","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and architectures. National Security Agency (June 1999), RFC 2627","DOI":"10.17487\/rfc2627"},{"key":"76_CR19","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS). Protocol Version 1.1 (April 2006), RFC 2346","DOI":"10.17487\/rfc4346"},{"key":"76_CR20","unstructured":"Stinson, D.R.: Cryptography Theory and Practice\u201d, Second edition. Chapman and Hall\/CRC Press, 155\u2013175 (2002)"},{"key":"76_CR21","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial in User Service (RADIUS) (June 2000), RFC 2865","DOI":"10.17487\/rfc2865"},{"key":"76_CR22","doi-asserted-by":"crossref","unstructured":"Deering, S.: Host Extensions for IP Multicasting. RFC 1112 (August 1989)","DOI":"10.17487\/rfc1112"},{"key":"76_CR23","unstructured":"Tanenbaum, A.: Computer Networks, 4th edn. Prentice Hall (2009)"},{"key":"76_CR24","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., p. 592 (November 16, 2005)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37949-9_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T23:58:50Z","timestamp":1563321530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37949-9_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379482","9783642379499"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37949-9_76","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}