{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T20:28:34Z","timestamp":1693686514065},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,1,11]],"date-time":"2009-01-11T00:00:00Z","timestamp":1231632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s10623-008-9263-x","type":"journal-article","created":{"date-parts":[[2009,1,10]],"date-time":"2009-01-10T05:29:18Z","timestamp":1231565358000},"page":"315-334","source":"Crossref","is-referenced-by-count":6,"title":["Establishing the broadcast efficiency of the Subset Difference Revocation Scheme"],"prefix":"10.1007","volume":"51","author":[{"given":"Thomas","family":"Martin","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Wild","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,11]]},"reference":[{"key":"9263_CR1","doi-asserted-by":"crossref","unstructured":"Adelsbach A., Greveler U.: A broadcast encryption scheme with free-riders but unconditional security. In: Proceedings of the First International Conference on Digital Rights Management, Sydney 2005 (2006).","DOI":"10.1007\/11787952_19"},{"key":"9263_CR2","unstructured":"Asano T.: A revocation scheme with minimal storage at receivers. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes in Computer Science, vol. 2501, pp. 433\u2013450 (2002)."},{"key":"9263_CR3","unstructured":"Berkovits S.: How to broadcast a secret. In: Advances in Cryptology\u2014CRYPTO \u201991, Lecture Notes in Computer Science, vol. 547, pp. 536\u2013541 (1991)."},{"key":"9263_CR4","unstructured":"Chen W., Ge Z., Zhang C., Kurose J., Towsley D.: On dynamic sub-set difference revocation scheme. In: Networking 2004, Lecture Notes in Computer Science, vol. 3042, pp. 743\u2013758 (2004)."},{"key":"9263_CR5","unstructured":"Dodis Y., Fazio N.: Public key broadcast encryption for stateless receivers. In: ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science, vol. 2696, pp. 61\u201380 (2002)."},{"key":"9263_CR6","unstructured":"Fiat A., Naor M.: Broadcast encryption. In: Advances in Cryptology\u2014CRYPTO \u201993, Lecture Notes in Computer Science, vol. 773, pp. 480\u2013491 (1994)."},{"key":"9263_CR7","unstructured":"Halevy D., Shamir A.: The LSD broadcast encryption scheme. In: Advances in Cryptology\u2014CRYPTO \u201902, Lecture Notes in Computer Science, vol. 2442, pp. 47\u201360 (2002)."},{"key":"9263_CR8","unstructured":"Intel, IBM, Matsushita, Microsoft, Sony, Toshiba, The Walt Disney Company, Warner Bros. Advanced access content scheme (2004)."},{"key":"9263_CR9","unstructured":"Naor D., Naor M., Lotspiech J.: Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology\u2014CRYPTO \u201901, Lecture Notes in Computer Science, vol. 2139, pp. 41\u201362 (2001)."},{"key":"9263_CR10","unstructured":"Wallner D.M., Harder E.J., Agee R.C.: Key management for multicast: issues and architectures. IETF, RFC 2627 (1997)."},{"key":"9263_CR11","unstructured":"Wong C.K., Gouda M.G., Lam S.S.: Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM \u201998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 68\u201379 (1998)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9263-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9263-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9263-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:25Z","timestamp":1559246305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9263-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,11]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["9263"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9263-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,11]]}}}