{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T03:40:30Z","timestamp":1649130030133},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s10922-005-6266-2","type":"journal-article","created":{"date-parts":[[2005,9,13]],"date-time":"2005-09-13T06:03:53Z","timestamp":1126591433000},"page":"293-308","source":"Crossref","is-referenced-by-count":1,"title":["Improved Key Management Technique for Secure Multicasting over IP"],"prefix":"10.1007","volume":"13","author":[{"given":"G.","family":"Padmavathi","sequence":"first","affiliation":[]},{"given":"S.","family":"Annadurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6266_CR1","doi-asserted-by":"crossref","unstructured":"S. Deering, Host Extensions for IP Multicasting, RFC 1112, 1989.","DOI":"10.17487\/rfc1112"},{"key":"6266_CR2","doi-asserted-by":"crossref","unstructured":"Mathew J. Moyer, Josyula R. Rao, and Pankaj Rohatgi, A Survey of Security Issues in Multicast Communications, IEEE Network, pp. 12\u201323, 1999.","DOI":"10.1109\/65.806981"},{"key":"6266_CR3","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094, 1997.","DOI":"10.17487\/rfc2094"},{"key":"6266_CR4","doi-asserted-by":"crossref","unstructured":"S. Mittra, Iolus: A framework for scalable secure multicasting, in Proceedings of the ACM SIGCOMM, Volume 27, No. 4, ACM, New York, pp. 277\u2013288, September 1997.","DOI":"10.1145\/263105.263179"},{"key":"6266_CR5","unstructured":"T. Hardjono, B. Cain, and N. Doraswamy, A Framework for Group Key Management for Multicast Security, IETF Internet Draft (work in progress), 2000."},{"issue":"1","key":"6266_CR6","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"Chung Kei Wong","year":"2000","unstructured":"Chung Kei Wong, Mohamed Gouda, and Lam S. Simon, Secure Group Communication Using Key Graphs, IEEE\/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16\u201330, 2000.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"6266_CR7","doi-asserted-by":"crossref","unstructured":"D. Wallner, E. Harder, and R. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627, 1999.","DOI":"10.17487\/rfc2627"},{"key":"6266_CR8","unstructured":"D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using One-Way Function Trees, Technical Report No.0755, TIS Labs at Network Associates, Inc., Glenwood, MD, 1998."},{"key":"6266_CR9","doi-asserted-by":"crossref","unstructured":"M. Stenier, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, in SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security, ACM, New York, pp. 31\u201337, 1996.","DOI":"10.1145\/238168.238182"},{"key":"6266_CR10","doi-asserted-by":"crossref","unstructured":"C. Boyd, On key agreement and conference key agreement, in ACISP: Australian Conference on Information Security and Privacy, Springer-Verlag, pp. 294\u2013302, 1997.","DOI":"10.1007\/BFb0027936"},{"issue":"3","key":"6266_CR11","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/4234.991148","volume":"6","author":"Li Mingyan","year":"2002","unstructured":"Mingyan Li, R. Poovendran, and C. Berenstein, Design of secure multicast key management schemes with communication budget constraint, IEEE Communications Letters,Vol. 6, No. 3, pp. 108\u2013110, 2002.","journal-title":"IEEE Communications Letters"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6266-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-005-6266-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6266-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T11:34:29Z","timestamp":1586432069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-005-6266-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["6266"],"URL":"https:\/\/doi.org\/10.1007\/s10922-005-6266-2","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}