{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:13:40Z","timestamp":1742951620343,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":16,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_42","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"245-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Dynamic Scheme for Authenticated Group Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Yang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Aixin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junhua","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Haopeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys. 35(2003)309\u2013329.","journal-title":"ACM Computing Surveys."},{"key":"42_CR2","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1145\/1015040.1015045","volume":"7","author":"Y. Amir","year":"2004","unstructured":"Y. Amir, Y. Kim, C.Nita-Rotaru, G.Tsudik, On the Performance of Group Key Agreement Protocols, ACM Transactions on Information and System Security. 7(2004)457\u2013488.","journal-title":"ACM Transactions on Information and System Security."},{"key":"42_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W.Diffie,M.E.Hellman, New directions in cryptography,IEEE Trans. on Information Theory. 22(1976)644\u2013654.","journal-title":"on Information Theory."},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"M.Steiner,G.Tsudik,M.Waidner, Diffie-Hellman key distribution extended to group communication, In SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security.(1996)31\u201337.","DOI":"10.1145\/238168.238182"},{"key":"42_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/BFb0034833","volume":"1163","author":"M. Just","year":"1996","unstructured":"M. Just, S. Vaudenay, Authenticated multi-party key agreement, In Advances in Cryptology-Proceedings of AsiaCrypt.1163(1996)36\u201349.","journal-title":"In Advances in Cryptology-Proceedings of AsiaCrypt."},{"key":"42_CR6","unstructured":"M. Steiner, G. Tsudik, M. Waidner, CLIQUES: A new approach to group key agreement, In Proceedings of IEEE ICDCS\u201997. (1997)380\u2013387."},{"key":"42_CR7","first-page":"1","volume":"1751","author":"W. G. Tzeng","year":"2000","unstructured":"W. G. Tzeng, A practical and secure fault-tolerant conference key agreement protocol, In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC\u201900. 1751(2000)1\u201313.","journal-title":"In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC\u201900."},{"key":"42_CR8","first-page":"290","volume":"2248","author":"E. Bresson","year":"2001","unstructured":"E. Bresson, O. Chevassut, D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, In Advances in Cryptology - Proceedings of AsiaCrypt. 2248(2001)290\u2013309.","journal-title":"In Advances in Cryptology - Proceedings of AsiaCrypt."},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, G. Tsudik, Communication-efficient group key agreement, In Proceedings of IFIP-SEC.(2001)229\u2013244.","DOI":"10.1007\/0-306-46998-7_16"},{"key":"42_CR10","first-page":"321","volume":"2332","author":"E. Bresson","year":"2002","unstructured":"E. Bresson, O. Chevassut, D. Pointcheval, Dynamic group Diffie-Hellman key exchange under standard assumptions, In Advances in Cryptology - Proceedings of Eurocrypt. 2332(2002)321\u2013336.","journal-title":"In Advances in Cryptology - Proceedings of Eurocrypt."},{"key":"42_CR11","first-page":"497","volume":"2501","author":"E. Bresson","year":"2002","unstructured":"E. Bresson, O. Chevassut, D. Pointcheval, Group Diffie-Hellman key exchange secure against dictionary attacks, In Advances in Cryptology - Proceedings of AsiaCrypt. 2501(2002)497\u2013514.","journal-title":"In Advances in Cryptology - Proceedings of AsiaCrypt."},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y. Kim","year":"2004","unstructured":"Y. Kim, A. Perrig, G. Tsudik, Tree-based group key agreement, ACM Transactions on Information and System Security(TISSEC).7(2004), 60\u201396.","journal-title":"ACM Transactions on Information and System Security(TISSEC)."},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"O. Pereira, Modelling and security analysis of authenticated group key agreement protocols, PhD thesis,Universite catholique de Louvain, 2003.","DOI":"10.3233\/JCS-2003-11404"},{"key":"42_CR14","unstructured":"Li li, Research on formal analysis and authentication technology of security protocol, PhD thesis, Wuhan university,2004."},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"F.Fabrega, J.Herzeg, J.Guttman, Strand spaces: why is a security protocol correct, In Proceedings of the 1998 IEEE Symposium on Security and Privacy. (1998)160\u2013171.","DOI":"10.21236\/ADA459060"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"J.Guttman, Security protocol design via authentication tests, In Proceedings of the 15th Computer Security Foundations Workshop, (2002)92\u201310.","DOI":"10.1109\/CSFW.2002.1021809"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:11:23Z","timestamp":1739761883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_42","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}